0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x20, &(0x7f0000000000)) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e24, 0x40, @loopback, 0x3}}, 0x7, 0xffff, 0x0, "0c945477914beba5878ba6b0583dc960b587cd21650f65d828f460d8b96a172b67c24045e5f01fccd6ce2c0499664ce800719cf34fc01a89824029bf8e5c965ca4a799771753a0512e55df04f7c01eca"}, 0xd8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 06:51:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x470, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x258, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x470}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000022c0)='/selinux/checkreqprot\x00', 0x8001, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c40)={0x0, @multicast2, @multicast1}, &(0x7f0000002c80)=0xc) sendmmsg(r0, &(0x7f0000005300)=[{{&(0x7f00000009c0)=@vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f00000000c0)="91f87856fba10dcaa91837a2678c45d7162893a500dbc92fe6155a9c70838f1ec5e5cf3e4648e5d139b0dcf8a372c1f8ba28b67fa406952c6ae50e52", 0x3c}, {&(0x7f0000000a40)="64237f57b09d3824f0cf380177b4859ee97dc9092707c06604c2cd635a", 0x1d}, {&(0x7f0000000a80)="13cb590e5f0beed32b713a3160b6e3573cc7fd4cf8cefdab28aadb35fa263b01d027c7c1f6e70f08c6bf2c7fd1d066cd8a78f796ab903d5698a00479eababdee53b9a2a0bf450fde242b3b6148a1b835b84f72bf31b54c27ae9b42b17a5e3f4caad41ebc6a4cac0a9f00d11629c462bcd03b51b223cb5ab86b79e6d95ca96640e4b9fe986f7690d2bb2d313c2409ffebf1ae9d95dc1760b11541ab5371593f722ebcabece976", 0xa6}, {&(0x7f0000000b40)="104a7a6bfe0be9d63200a53ea79cca238daa53", 0x13}, {&(0x7f0000000b80)="9079ed08cf4dd2b62091f4c1637a721b33a1c61e53729541ba63a67b8dc1990eac957d779250096e92b438bb58f328ee3f43a9f864684f85c5eea0f8723811d8a1758f60829d386c104061ead4ecae345db290a7dd471e2f30653ceabd00ba4cb94b97e55094d4aeb0c68bb94492e65e2dcc394b9da56cac976e6a63d69573bbc0ab5de9faddb72f43cfebc90bfddd7efe538ff4c94fb0", 0x97}, {&(0x7f0000000c40)="754301433aa42a3b7630f99f653d641371040dd21da2283aa82fe78cc080ac70ea17d6c59e57d745f8605aede9c8d51a9397fa20722afe23003160a5e3947002189726883e71d7366962bc635622ac0a7e6890689c56238590eeffa61f220203c87b659318e87ee0080d80b4ff1e3d5f3e97cbdb6050c92f1c0e9afca29a6fcd9762815093a6322f922474c7d1327a49d2e43612ae187f40e1698d14a2c5fcbb8144e117faf12ad13b214e60095c506f07d79adac457afb79d22068279029cf756bb87446f3d52", 0xc7}, {&(0x7f0000000d40)="e6248f04016a1618e361727b4574734d65f59b6ada1bab9a0ce67403c3514c90fc3bde909c67a76cdb8a1b11a53d746610029d1e34059c4e2361718491c9ad9e54d43d8473d201a7a3b72692e1f138c328c79c11660fefa7ff330d1e734f01", 0x5f}], 0x7, &(0x7f0000000e00)=[{0xf0, 0x10f, 0xffffffff, "503c8e0ceb2a4061751f0d82b4dd617db8c6a0f1a6b5c1b99b3e7ae0c741732926a8299472b07dd0484d2fe3efa8e800f8a34d584b5229c102d4dfa429f5d5b8ba32ba314c0eb78ab74617f37542a035822db57e118d74559cffd3878b4f7f98e1cd28008c278247bcf42656905220473cebcd52041422d80d05fbafe023e3c75cd1e05ff5fdd480dd195a3fb37254d19cc06c6fd939999391b9ba36f960a3df1841ebd17b664a67a7e5a3da7c6f1f10c2eb069d6e632d1f12d6038e34d5b4476d49b1f94cc0a37f3d5f1aa4ed62bd86349ef603496fae5f95f0713bd296cf3622"}, {0xb4, 0x105, 0x7f, "5e04e0dd78d78958fd754dd7f2c83339e5923aeaac9b9f0f917b3338b0cf74ff5c63ec173e39376cc41a6e0f4c3e2a0a6032dbb40dad90efa2ee16892ede3fbe1a6c6baea057a2c8f9b01490414d5a020092d023a9278bd919cbff9aab19aaa44280cc1ab01b8da71b14e4d21e4f4038659f41c436b38e5a61a5fd776e34255cc5fc27b502448a8b56aed48dc624858ef2e675a5d82aeb7371261625a1886a8ec8c8a2c3cf6a51"}, {0x10, 0x102, 0xc9, "3b83ed"}, {0xd8, 0x109, 0x7bf, "a093d3713cb6b2a3aee193398c1cb68895ef60f22c791a3f3460e8a056b81a88250085828f971203a911138614faf4694412742457a4797c4b0ba6b55078b5ab10e8f2ce8157b0767705d800c8a0201ad9495550c53c7ef3684f68828cd51aaee9568b363d97daee22189adf1daaff1a6e08298ca44a390ae24f73ac9b628c7ce4c4a562ac02642d2662e88bd682f6e4ad4d5ce6647f69650a16247fe94c8e0f1e052025134d5a75e3126b38150251d0af611d563f2778d25b7659f12cd1f415c61dfa8bd6a4340f235f"}, {0x38, 0x1, 0xffffffff, "d8fd3cd47e1ddaf6077436dbe76e49258336c69be819f9802c93839d805cf58a9c9ea3179ff27ad6685b79"}, {0x54, 0x115, 0x3, "67fe7bc65a493974a0993d43da26f69d885fe2ac09a8dd2b4cc07e7e2f620c6dee9b06983e6bed5d5663ef8d0fd729ef2ce154ad66bd15af3590c77eb316df9c606f877216"}, {0xb0, 0x189, 0x8001, "a21d9039ea0c415663abe12187623f861a09f06231c3d4e836e39b92a155faf9c29761d8f53cc883a793a9b842e4641ed734224b1ae617ed9275699b1012a64b7de0fac58bc53370bc7ddfb3e108ecb32232214908b1bcc423ded6a81bc33aac155fb4bcc7a0578eabeb93406bc2981c373226f17b2aa81bc6462225ad8e78f4a72f5908e7c6a4fff4d2ad5165c06a35f8070607fe9095d5fe9d02c5369433a4256f1450"}, {0x50, 0x114, 0x81, "ba0ecefaba056f713ffd8b12f3fd377a8c5b40c281fe3bb92b2594f2afb3bcc10deed5927f4eb5563734f0a54687aef5582ace60e02fbdc8a7f84ea24b0be76412"}, {0x8c, 0x11b, 0x1, "0a909b7a5112a922603eeb6cf781f8531839da5a2ab27f9adc38ba71a3df410927b8f7a1a22ff0e7b3536cfa398daca5276af4ed2bdb744c19946cfd24dfb45ff835dcd382440b3ee9676e9e08ec6e7310db476c97b9441adb8b70eeafe52e1c6495c2ced01b77d53fef539e1100ee43fae0e4ab30cdbde65344a1c7b5ce"}, {0x100c, 0x100, 0x2bdf2017, "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"}], 0x14b0, 0xc0}, 0x9}, {{&(0x7f0000002300)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @local}, 0x3, 0x1, 0x0, 0x3}}, 0x80, &(0x7f0000002740)=[{&(0x7f0000002380)="2713bfaf60ff55c5ab38f00e90be9976c0bec61445368b0d2c11336ef54f88db1acd5c9eae1520afc125ff9694726d047f923ab3a92ba0dcc701f1746eaeddb0cb8f74efbb046ff8568dc688f021427395568deb89cf8fd8296e25f414734b475d931fcc060248042dc8e5c06732efe42b895810d01590eb5ef391c4384476877e66038a7d6e4ee98218d025f69239624df42c31f663dfe398366027555b39d30ef873a578cb02ea54a8947ea0f66f093b0e7510c3eff68c01a712762f6eeaa7fb22b6dbd0275493af216fea271d79a8", 0xd0}, {&(0x7f0000002480)="ecef05e820ae86931cd7aa3938fee9acb2513c21fc2bcba15f6c05b36d92cfede54c", 0x22}, {&(0x7f00000024c0)="f85b973020096f9dea5a95d31db08b186890a70950318786face52526a14957569bf6d8c3ff4bbf1c5c5988dce499910a21e3337563af325e95c0e8f8262c0458639ef8ffba3a24cb694e73fbf302bd474faf81046baf928cb2ea316c5abc63ea2499ba2af78fcba92335792c20fb218d484f6095dffc833883b19b78f78e9a35228f802505e5e68d464225b93cd5ff3da9604b0a62b1c7b6ced34c98307e7c779bee53722471d268ae62a74dbad712d530861df8758792b67ca", 0xba}, {&(0x7f0000002580)="ad71e1cc8ef49847e1e2ffbd322227305890445ef1aece10f243b89fa63b9265938808f6acd8431bb5aecb8e6de0a4313f5cec2e350d7b88d0a6c28145fbcff713a7de4034a400c702bc7ccf9d9e42d7e7204791c0b00ec28353614e15771c4571da1513aab9dcff3c95a1ae4975ad096b83ac9ef52024fd6b1ff45b85faa2f4348ac3530579f2e015bc802df93345f93faf01b900524554391864e0aba5ac4d0a6fdfd299", 0xa5}, {&(0x7f0000002640)="e88a213b8ade04161b70717692582c6049efbd7959489cc94d1cde2a08f3ec58e5dbe301e4d9c7cdaf28aac951bf8c74be63ddfb0f18cc8733aa27f4cb0b725e84dbe80ae1dcefcdf2ff3d554047d55965bbb37d18d1b4446a869b9b78fc7652d2a0d7bf87966bbceeb29eaab24e5bcb37c50e881543f23dc143ee38efb6e713877ac21ea231b800b47d0a20c6d2ced65517fbbfba9ed7081023f4228e5d62d6c1a3b4bbf5eb739bf9fefb86d4b245f6370cf78b45ad6131ce7321eea336e07cad2b4f8304f147439904893683", 0xcd}], 0x5, &(0x7f0000002780)=[{0x100, 0x116, 0x2, "8b32323211f8ce37a31ede08384bdf1630b68ff564e6f894824e501ade7f1bd1faa85c5031724ec3d603be757ec25dd922d86f7aa2fdd4556e85ef8edd4819ab90da31e41f97201c3bb58311e616e6635ebefc5e3f4a274b0bc53f0f735c2a8df4afe4b8e1bb30170a1971e34fd8fcb2071e22eddc512d58aca616aef7a29a9430a286f0e2f74e55204de7d4ab93c3f6835a1f92825a751b052813d83f26e3a59205c7a2b59fba29a09a72ab71d6c09db41d853d9f5d122f02e6af526bb4c0e77cf6c906fef416f47ca2e1ea2f7a85793e76fd836de4bb50ed0b7f1faf90210cdacb897a6cfa26d936c92aad6dddb9c112"}, {0xcc, 0x119, 0x80000000, "9757dbcca1fb360fc7b096a8457321917567a40fddb96840ae9ac875f92564d9d72f5f86f471ea33f52ce9b41052ebee5cb6663c198b680d5ef3f6a12425183592c33437ee36822856a2396af71ccf643ce6b49d582fd052081d034011973a7db4da4a7126b2c476501f5fe3cc38be72546c9cd98eadaf36fe35f4497beac417909ce26b91dab7cf90a93ab879e831f4b30dbd0b06a735df1c43403e1399a62f7074e1e0d5ae62137fda4050fe070deda00cd50c505c57862f295d1d079b"}, {0xbc, 0x1ff, 0x9, "fee1ee170dc78c4239a6bf25d13610dc5759d1a8f9bab39f73e50b14daeffafabfb65c28ac93168a6b7ed3aa857dd8d63831ece7bfde6e9fab9efdb04bc1ca8385ce4c83836c2677980b58d6c2c108dd9e06ada4042dc0697e78c7040048c5a3845c6c29b41b4f4c72285e817a459d79eb63f5ab9b9799508d84da5d072f9feddba121f0a82a0a7dd65d38c125ba1709501b1e1fa8ed06c9efd83fcf8a62e24ad754a75fef9f73c993f07b27b5a7285c"}, {0xf8, 0x117, 0x9, "fee0a94cf9ca4c396042daed76054400545acd65ffa83d68760e3dccb94ee6378b54773d607cf396ab8d4556d7409fd20ca15da6264b163e16814aca9acabb341538415f406736787ff96373aa1188e696c5e2dd578e952ebcbe2fdcced762acc119072bad791f8fcd6546626a6966346d71546fdbbc853b84d23c6e1111d9712732779061d1875a6b50455f48531b3588612796b5d03333d6d8db3780884f9fc9c0fcf392825086ef5c3beef8b73d0184b5a95ed54a78a9d4cae06e7f03290bf5b2989fc59abed64804770a4f97ac71a3a2e6bf9c06ece666c16159a2ff33f83482c89ff86091403a636d"}, {0x5c, 0x100, 0x20, "ccc4c877a22919e5ec12e99c5446fdc3331e0cae5258ac5722eaf85dd49fee1def656ff2060e25643bc629aafc06d0f6c50dcdb2f5f16a117eb68a93717a7d71132e145f6890c8fef263485cc1bd"}, {0x84, 0x11f, 0x1, "6b6b136e35a8bc52fa8f109645df3beb40b6276f1c95d077c6236fccede8d47e978bde5c486ac113c6be3dda28423f17c947ec4c94c0d9c3922924df127a626d30f8565cd4ad686d32e5e2484fc90dfc05c638600984cddefabf181281f7a55985b0a61856c43b7b0b398ed020fa0d912dfc7e7560bafdf6"}], 0x460, 0x4}}, {{&(0x7f0000002cc0)=@hci={0x1f, r3}, 0x80, &(0x7f0000004140)=[{&(0x7f0000002d40)="bf01a3e1e63502b641fd6e95d97f7603e71315e9cb879a5f32b06288b83ba95fcbb75d3cd7320a5f5289e63875c0dfc61a6fecc96347e78af6de33fb1824ef9eb31396a2ce31399ce099d46bc621dd60b3a1def3580befb3998ba5a5749ebc11d671a2dc2d", 0x65}, {&(0x7f0000002dc0)="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", 0x1000}, {&(0x7f0000003dc0)="7f60b53a0cecdf01ae", 0x9}, {&(0x7f0000003e00)="6ae7a88e45546e5eefbe52470bbe8110ecf84e6099d251c94848a5bc1faf0a830b39e7d09138ba6bc03896641aebdb6ec3d2ae121cb6dbbae32057b5d978b21d4781ee0d2e1a7aad05893fc729d5b53279e3029dc2f6e5e2f2bfd8960bc2ca6ca4f80bace5c89a2ad25e871e596180", 0x6f}, {&(0x7f0000003e80)="eea9426685af26870dacd8e9e4a78e3f544795824eae1dfd84b79689f40bdc84dbf705febf5a08ce778139d9f09e338075cfbeff89a6b6eb036e054f71c136f88b46f7939b36a54915684d00a7f565bb40007f6a9e3bacde75deea614ad3d0fe13582e0236eb71abc22e193c07f9ca8935fd", 0x72}, {&(0x7f0000003f00)="16c9d54cbd6f308ee6521ac1d6f3c4e3e2", 0x11}, {&(0x7f0000003f40)="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", 0xfa}, {&(0x7f0000004040)="b4d1eb358f266362aacb9e3376757ee75c61419e2151dba7099bb008b8e9469e18ceb0f8b75148ffa4288f4da4b9eef43d66590ce3bfcbbaae1e3cdb63ae4f0c26bc367531d1", 0x46}, {&(0x7f00000040c0)="7f2989345f82efbbb31f43ea85936e8ce7b7379206f6df67e4eca262580d3301fec2af829cc7801f3ddad7958ffd4ab99784686689d9298469614680a3a47eba490ad37fc9f960baf93d48f1f784c3d10d670c57b9ecade8c8aefd73ff88ec5fde7446b2c6b32acb6699b0a46bc894b6ba", 0x71}], 0x9, &(0x7f00000041c0)=[{0x100c, 0x10f, 0x1, "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"}, {0x14, 0x10f, 0x3, "8b29bd135fbb91"}, {0x108, 0x105, 0xffffffff, "c060c65689ae3cdb4d809bdb5c6c5422e2224ba10beb1528a08e3f017752af54d05c8eb5f66ad509fd8cbd2400199ad9d9e95a95a5ea58064c07c9c988472ffbc61e0ae6568284e67d34592bc1026a46ea5f641cade4f2e92a8a3ae4ea4ca63c44255fa35af86b281f9cbfb7cb4aea59e7cea193098978f9b429ad6865b3fbdf7dbadbf700d71b8bfb5dbf32b9268b853e9499c209f869151688b84534d0fc8afa9db16b289c84f493ae476c9b0fa77ca5b47f624fb77573b350cc0124c24b7deb5ac8497b50e95cc9918758f08f213eba59675bbe583cac6d47c5b14e23225982693542f8cb8b0fb6230ff8c92a3594fc2577c32c3466e9f6bc0e"}], 0x1128, 0x80}, 0x3}], 0x3, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000080)={@loopback, r5}, 0x14) 06:51:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x470, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x258, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x470}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:38 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:38 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:38 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x7f, 0x7}, {0x9, 0x5}, {0x18a}, {0x7, 0x6}]}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:38 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x1, 'eql\x00', 0x3}, 0x18) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:51:41 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xffffffffffffffff) tkill(r0, 0x1000000000016) 06:51:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:41 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x13}, 0x8, 0x80000) ioctl(r0, 0xfffffffffffffffe, &(0x7f0000000140)="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") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000280)=0x7) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x100, 0x0) 06:51:41 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:41 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x7f, 0x7}, {0x9, 0x5}, {0x18a}, {0x7, 0x6}]}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x28000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:51:41 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:41 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000002}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="26082abd7000fefac58aa9872cb8ca2500030000000000d29f0800000000", @ANYRES32=r1, @ANYBLOB="8f13806f75d40ba99412b75b4faf2fbdf3e1069dd74008ff2198001d"], 0x24}, 0x1, 0x0, 0x0, 0x4044014}, 0x8000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000240)) creat(&(0x7f0000000180)='./file0\x00', 0x2) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x501) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 06:51:41 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) sync_file_range(r1, 0x0, 0x4, 0x6) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1f, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:42 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x46c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x254, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x46c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:42 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) r4 = getgid() fstat(0xffffffffffffff9c, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000740)=[0xee00, 0x0, 0xee00, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) ptrace(0x10, r10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000880)={0x358, 0x0, 0x6, [{{0x0, 0x2, 0x4, 0x8, 0x1, 0x8, {0x4, 0x3, 0x20, 0x5, 0x2, 0x9, 0x81, 0x7969226a, 0xa1b, 0x2268, 0x1, r1, r2, 0x4, 0x4}}, {0x6, 0x8, 0x12, 0x8, '/dev/loop-control\x00'}}, {{0x3, 0x3, 0xff, 0x1, 0x4, 0x7, {0x1, 0x7, 0x0, 0x20000000, 0x1, 0x5ea8, 0x9, 0x100000000, 0x1, 0x0, 0xfffffffffffffcd7, r3, r4, 0x2, 0xf6}}, {0x6, 0x8001, 0x9, 0x1, '/dev/ppp\x00'}}, {{0x5, 0x3, 0x80000000, 0xaf45, 0x800, 0x0, {0x5, 0x1, 0x1000, 0x7, 0x7f, 0x8, 0x47, 0x6, 0x8, 0x1, 0x1ff, r5, r6, 0x0, 0x65}}, {0x2, 0xfd2a, 0x0, 0x400}}, {{0x1, 0x1, 0x80000000, 0x0, 0x27, 0x6, {0x5, 0x3f, 0x2, 0xc664, 0x8, 0x130a, 0x4, 0x3, 0x6, 0x4, 0x29268412, r7, r8, 0x3, 0x5}}, {0x1, 0xfbc6, 0x12, 0x10000, '/dev/loop-control\x00'}}, {{0x6, 0x1, 0x100, 0x1, 0x8, 0x3, {0x6, 0x7, 0xfffffffffffffff9, 0x1, 0xfffffffffffffffe, 0x41, 0x3, 0x5, 0x0, 0x5, 0x100000001, r9, r11, 0x2, 0x100000001}}, {0x4, 0x9, 0xd, 0x20, 'team_slave_1\x00'}}]}, 0x358) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) ptrace$peek(0x2, r13, &(0x7f0000000080)) r14 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r14, 0x301, &(0x7f0000000240)) sched_getaffinity(r13, 0x8, &(0x7f00000000c0)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r12, 0x0) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/ppp\x00', r14}, 0x10) setsockopt$SO_BINDTODEVICE(r14, 0x1, 0x19, &(0x7f0000000140)='team_slave_1\x00', 0x10) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, 0x0) [ 2765.723069] audit_printk_skb: 1674 callbacks suppressed [ 2765.723076] audit: type=1400 audit(1542351102.402:238284): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2765.732319] audit: type=1400 audit(1542351102.412:238286): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2765.735221] audit: type=1400 audit(1542351102.422:238287): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2765.740867] audit: type=1400 audit(1542351102.422:238288): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2765.752698] audit: type=1400 audit(1542351102.402:238285): avc: denied { sys_admin } for pid=2085 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2765.754348] audit: type=1400 audit(1542351102.432:238289): avc: denied { sys_admin } for pid=2085 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:42 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x20000, 0x0) sendto$inet(r2, &(0x7f0000000280)="8344d6d3e7d0b53b0446fa6c53a82040d21139f33921b75ee8680ab965f5cf8b06795f37bf9d9cbe3514568ecff411149ad63ea3d2714c4885b2f84a15d5632b9f91fa0c2982c794e3236bab8a527e604217a1eccc4036f07112", 0x5a, 0x0, &(0x7f00000000c0)={0x2, 0x4e22, @local}, 0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x400, 0x0) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000180)=""/247) 06:51:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:51:42 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:42 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180), 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x564, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}]}, 0x564}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2765.759242] audit: type=1400 audit(1542351102.432:238290): avc: denied { sys_admin } for pid=2085 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2765.794333] audit: type=1400 audit(1542351102.482:238291): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x46c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x254, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x46c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:42 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2765.798008] audit: type=1400 audit(1542351102.482:238292): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2765.830613] audit: type=1400 audit(1542351102.512:238293): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:devicekit_exec_t:s0\x00', 0x26, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415"}, 0x144) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x40, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x7fffffff, 0x6, 0x1, 0x0, 0x6, 0x8, 0x1, 0x3, 0x200, 0x0, 0x2, 0x80000001, 0x4, 0x3, 0x2, 0x1, 0x1, 0x8e3, 0x40, 0x3f, 0x6, 0x1, 0xfffffffffffffffc, 0x100, 0x12, 0xffffffff7fffffff, 0x82ad, 0x2, 0xb7, 0x6, 0x6, 0x1, 0x4, 0x6, 0x80, 0x0, 0x9, 0x1, @perf_config_ext={0x3, 0x1}, 0x30010, 0x1f14, 0x3f, 0xf, 0x80000001, 0x3, 0xfff}, r2, 0x3, r0, 0x2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:51:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180), 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x564, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}]}, 0x564}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:43 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:43 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:43 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:43 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:46 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$setownex(r1, 0xf, &(0x7f00000003c0)={0x0, r0}) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, r2, 0x0) clock_gettime(0x1, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 06:51:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) init_module(&(0x7f0000000a80)=':cpusetsystemposix_acl_access\x00', 0x1e, &(0x7f0000000ac0)='/dev/keychord\x00') r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x200080, 0x0) write$P9_RATTACH(r1, &(0x7f0000000a40)={0x14, 0x69, 0x2, {0x80, 0x2, 0x7}}, 0x14) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000a00)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000008c0)={0x124, r2, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7fff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xe3f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80000000}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:51:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180), 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x564, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}]}, 0x564}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x46c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x254, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x46c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:46 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendmsg(r1, &(0x7f0000001300)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @remote}, 0x2, 0x0, 0x1, 0x4}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000000)="e57376bd286c8a61846e0bf0f7a019be8f50d91358c5f62e0fcdb97646dea19d", 0x20}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000000140)="1ddee8c267e647628c1a9b7bd5f148a8170bf83b9f8c168e87a38946d4633527e86701a475342cccbf277496693ad93f378da3ed10500b6f8bb77c95deb17e037897a2fe0e1a9bf5", 0x48}, {&(0x7f00000012c0)="dc8fc5a688b52caa2d7a94e243a2f498458dd45fc4dd92de7443717695e51599", 0x20}], 0x4, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x5d0, 0x4000}, 0x800) flistxattr(r2, &(0x7f0000001880)=""/205, 0xcd) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40042406, &(0x7f0000001840)='/dev/loop-control\x00') 06:51:46 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:46 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:46 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x440200, 0x0) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000080), 0x10000, 0x6) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000140)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) pread64(r0, &(0x7f0000000180)=""/240, 0x11f, 0x0) 06:51:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a0, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x288, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) 06:51:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:51:47 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x4) [ 2770.735701] audit_printk_skb: 1692 callbacks suppressed [ 2770.735709] audit: type=1400 audit(1542351107.422:238858): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2770.774302] audit: type=1400 audit(1542351107.462:238860): avc: denied { create } for pid=15063 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2770.775714] audit: type=1400 audit(1542351107.462:238861): avc: denied { write } for pid=15063 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2770.782442] audit: type=1400 audit(1542351107.462:238862): avc: denied { dac_override } for pid=15064 comm="syz-executor5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:47 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:51:47 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:47 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000140)=[r2]) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 06:51:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) [ 2770.785317] audit: type=1400 audit(1542351107.462:238859): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2770.814208] audit: type=1400 audit(1542351107.502:238863): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2770.830834] audit: type=1400 audit(1542351107.512:238864): avc: denied { dac_override } for pid=15064 comm="syz-executor5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2770.843263] audit: type=1400 audit(1542351107.532:238865): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2770.844988] audit: type=1400 audit(1542351107.532:238866): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:47 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000000)=@known='trusted.overlay.opaque\x00') ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0xffffffffffffffff, 0x0, 0x2) [ 2770.850448] audit: type=1400 audit(1542351107.532:238867): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:48 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) 06:51:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a0, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x288, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:48 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 06:51:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000000)={0x400, 0x6, 0x5, 0x81f4}) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:51:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) 06:51:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:49 executing program 2: r0 = gettid() r1 = syz_open_pts(0xffffffffffffff9c, 0x400a00) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x7, 0x10000000081, 0x4d5ebce6, 0x2, 0x7ff, 0x8000000}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x109000, 0x0) 06:51:49 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) ioctl$TUNSETLINK(r1, 0x400454cd, 0x3) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) 06:51:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:49 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000000)) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$P9_RREAD(r1, &(0x7f0000000080)={0x76, 0x75, 0x2, {0x6b, "6bc676f3ad26468723071e587897eff7a42fb4e2467fa7496ae3c0c28ffe626cd53439f169275f908c276c76816e5cb0fbae03c620bd7171686bc7cdb96433420660aca8eac538ca8f1f5dd4442ed9ca2be49d01ff571a2d39aa4201e9ad91d7e5b08520c01e1d68c18cb8"}}, 0x76) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:49 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a0, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x288, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:49 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0xff}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x2, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000180)=r3) 06:51:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) 06:51:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:51:50 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000000080)="4f337621927c91aba3271e86be813742898691134443f4af94a3dbb0ee59e13a1cf7821049d434ecf2c580cd0987e99867eda2426d8d57be34658b92ebb0e79edca27e7dda19970ea57f9c0bb4e61bb7ec426068571e1e6841a512dd9f82ab7373cf529f48650ed2fb4a508438308d2487871f75ba29", 0x76}, {&(0x7f0000000140)="62b493c804115ca0f36359b98ce19e885968362671887964319a5ceb98560f658a4643673019f14f6cdafccbeaef3855ed5177f0eb0a24f79fd2ee9e2e8a08c29cf3a758e1c7b1452e1f18783e0aa9e73e37edf57746b8a293019c911b1678738d10543a32cda932990991ec32d205a798b4f111764e0f9571efa564dd24184132aca78a32c72f39ada74725f15db7c125cfe01c7f2f89d289a74448f84d7e65df7b366d94cffd4377cda7202ddf7d2a1eff9e3753857b76dc7bab44195af5136c170c387f064ec9856e", 0xca}, {&(0x7f0000001280)="a0a40e4779fd70f9e202a7f355c4793aeb038e30ce65ef8965b79777d4c61f558d9922f57d7b7f00af4fc6f7350a228107b81c3aefaa6264c8a619266a2952fb34c31eb715c6e1b30c3bda2e61601dab28f075d578376e34cecb79af592359c5dce3afdc14abafbde066a0ff5df2ab7448e0fec7707827d6283ec2c4e266752ec64c077d9479cf7f11a12484093d93e95de82e3a0f0db6510a3b4837acfa65783bdf40e3db79d93ae7777f5768a18f7aacecd1a58e5c7cfa4632bfed2cd973aa8cac7e0b08d34c11e7904aeb940b", 0xce}], 0x4, 0x1) 06:51:50 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:50 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) 06:51:50 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:50 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000000)=""/4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:50 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) r2 = syz_open_procfs(r0, &(0x7f0000000040)='gid_map\x00') setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000080), 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) 06:51:50 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:50 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) 06:51:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:51 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0x10021) pipe(&(0x7f00000001c0)) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RMKNOD(r2, &(0x7f00000000c0)={0x26b}, 0x3f) fdatasync(r2) write$cgroup_type(r1, &(0x7f00000003c0)='threaded\x00', 0xfdb1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) 06:51:51 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:51:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf3041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df574150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b983a0f9b61c2735000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e3ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f27efc24078fd9661af9d7733138dd1bda38047374333d9082a70b323f1647ef3f1eaa094b0ea9e0b1c73cbaa720f41205fb6de008ca65d32cbe9835b5d60358c15f2a477f5dc8da87fd79e63341cc69ccf7baaa5e865cbdd77e61db8708a6c9c03e5cc78f808ea42e0d3bb67ebce71fd64dc2dbd0db4fd780ba76a56bf4b7"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:51:51 executing program 5: r0 = socket(0xd, 0x7, 0x8) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'ip6_vti0\x00', 0xc}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x12000, 0x0) getsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000280)=""/4096, &(0x7f0000000080)=0x1000) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000140)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socket$inet6(0xa, 0x80007, 0x0) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 06:51:51 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:51 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2775.747716] audit_printk_skb: 2847 callbacks suppressed [ 2775.747724] audit: type=1400 audit(1542351112.432:239817): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.758105] audit: type=1400 audit(1542351112.442:239818): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.759949] audit: type=1400 audit(1542351112.442:239819): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.781875] audit: type=1400 audit(1542351112.462:239820): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.807498] audit: type=1400 audit(1542351112.492:239821): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.846786] audit: type=1400 audit(1542351112.532:239822): avc: denied { read } for pid=15230 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2775.859888] audit: type=1400 audit(1542351112.542:239823): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.861148] audit: type=1400 audit(1542351112.542:239824): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.875241] audit: type=1400 audit(1542351112.562:239826): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2775.876394] audit: type=1400 audit(1542351112.562:239827): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:54 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1da}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000040)={0x39980732, r0}, &(0x7f0000000080)={0xb9, 0xe00000000, 0xfffffffffffffffb, 0x3, 0xffffffff00000001, 0x1ff}) tkill(r0, 0x1000000000016) 06:51:54 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:54 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) 06:51:54 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd9a79a94cdf37c46e1c04f0d217da4282efaf4e66317d4f5b444804e42b52fa5e44a70923acc6f17d"], 0x744) sendfile(r0, r0, &(0x7f0000000080), 0x9) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x120) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) 06:51:54 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:54 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x9}, 0x20) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x20002000, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}, {&(0x7f0000000140)=""/203, 0xcb}, {&(0x7f0000000280)=""/227, 0xe3}], 0x3, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={{r3, r4/1000+10000}}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:54 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) 06:51:55 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x40000, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40047705, &(0x7f0000000080)={0x100, 0x9}) ioctl$RTC_VL_CLR(r1, 0x7014) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = pkey_alloc(0x0, 0x1) accept4(r1, 0x0, &(0x7f0000001e00), 0xc8c3076643a726c9) pkey_free(r3) getpeername(r1, &(0x7f0000001cc0)=@hci={0x1f, 0x0}, &(0x7f0000001d40)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001d80)={'team0\x00', r4}) restart_syscall() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) prctl$setname(0xf, &(0x7f0000001dc0)='team0\x00') recvmmsg(r1, &(0x7f0000001c00)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000240)=""/249, 0xf9}, {&(0x7f0000000340)=""/28, 0x1c}, {&(0x7f0000000380)=""/219, 0xdb}, {&(0x7f0000000480)=""/105, 0x69}, {&(0x7f0000000500)=""/38, 0x26}, {&(0x7f0000000540)=""/4, 0x4}], 0x6, &(0x7f00000005c0)=""/95, 0x5f, 0x81}, 0x9}, {{&(0x7f0000000640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f00000006c0)=""/242, 0xf2}, {&(0x7f00000007c0)=""/22, 0x16}, {&(0x7f0000000800)=""/13, 0xd}, {&(0x7f0000000840)=""/10, 0xa}, {&(0x7f0000000880)=""/181, 0xb5}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/92, 0x5c}, {&(0x7f00000019c0)=""/112, 0x70}], 0x8, &(0x7f0000001a80)=""/59, 0x3b, 0x800}, 0x7}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001ac0)=""/24, 0x18}], 0x1, &(0x7f0000001b40)=""/179, 0xb3, 0x1}, 0x8001}], 0x3, 0x3, &(0x7f0000001c80)={0x0, 0x989680}) 06:51:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:55 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futex(&(0x7f00000000c0)=0x1, 0x8b, 0x1, &(0x7f00000001c0)={r1, r2+30000000}, &(0x7f0000000200), 0x2) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(r0, &(0x7f0000000040)='attr/current\x00') setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000080), 0x4) tkill(r0, 0x1000000000016) 06:51:55 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)='+\')\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) recvfrom$inet(r1, &(0x7f0000000280)=""/73, 0x49, 0x100, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x1, 0xd8}, {0xfffffffffffffff9, 0x6}]}, 0x14, 0xc89473b084bb21d2) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x17, r3, 0x1, 0x5, 0x6, @remote}, 0x14) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:51:55 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0xfffffffffffffdf6, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:51:55 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:56 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406055c9, &(0x7f0000000140)={0xb, 0x1, {0x56, 0x3, 0x0, {0x80, 0xffffffffffffffe0}, {0x5, 0xfffffffffffffffb}, @const={0x3f800000000, {0x6, 0x9, 0x7ff, 0x2}}}, {0x57, 0x8000, 0x8, {0x7, 0x9}, {0x1308, 0xff}, @period={0x5d, 0x7, 0xb5b, 0xfffffffffffffffb, 0x8, {0x6, 0x101, 0x6, 0x8}, 0x7, &(0x7f0000000080)=[0x80, 0x8, 0xfffffffffffff417, 0x6, 0x4, 0x8000, 0x7fff]}}}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) close(r2) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 06:51:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:51:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0x0, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:56 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:56 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000180)={@mcast2, 0x0}, &(0x7f00000001c0)=0x14) sendmsg(r0, &(0x7f0000002740)={&(0x7f0000000280)=@xdp={0x2c, 0x1, r1, 0x1d}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="7fadbdfca94d0cf24d4eb973129aefa7f14153e9da18945aef0084142cfa0aa1efd04008c135522d933692c5f9b96274fb0f8b3362b128c0d50e9ce8eb6a570a191e377848648a8c29fa36325e3032df90bdd5e7a4b9f0168b0015f343f950218ac33d5288f8665efa77dc3a6963bc794b", 0x71}, {&(0x7f0000000380)="700c7f8d06223ae837a2158e4828be8fe85dfe19fdc31625bbb5b8ed0346583a824dd6750349d45f72764d16303021303e4bdcec77bcb489d33be2b5612403ef6819295d15e814893bcea60f85de1d253eb5df840fa8c5da1068544857c6fbca667653c3f4792495e8a38ed85baabe4207d2cd44453490f8a506f16825185cbf6229ea3c4e8e945fb77c", 0x8a}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="ae8c4413075ac828b63567a36409fec89b10a91a9124411fa84770ac50477addddd58ab213662b66acf61499102b2551b52ed0a88e5f0621f48656f7c807eec82a43a8a351b9075e4dfcc5c8a92132df9359549e06d0a042781196fc3f7f85df7d6e25fa2059deb7c0d56ba37c3123cec78cd21398649fd22112f3026618f93fe9df42685fdcc22b80805f3b539a610b6e61916dcc1a432ca80c413d3f649993023807628dc47c9495e568de41de44893939526813e6587fe7", 0xb9}, {&(0x7f0000001500)="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", 0x1000}], 0x5, &(0x7f0000002500)=[{0xc8, 0x3a, 0x2, "af0d83d9e3e5fdc678b0fe7281c31183e2bda27c3d33ca51b9e4075a2ee265825dfb915554705a22945110647f30f61167e3266d099e2cb18c5b056aba92b9f5687eb05a316286eba522a112cce91ccc18d9180a4234de5ec4bbe8dbd9eb89271b939fb3e62dfdf1466235c00646915fda39a06b2df90a3f3b1a462db6fde225df671a1c1e28b84827146ee66210777c64052ea58b28658a661e3abd6bc0cf638be076c281070610ab19735711b8662ef6512c515b6b369c9a91"}, {0xdc, 0x10b, 0x0, "8e1cbb4302d20927fd3a9cec19c1d682c527e279d7098671d41143028ee7b9aec21e80090db59dafce9f4a5d85663cfb99c02b657e3a988e9793df04b4c258d73b7ecb8855c23ddc2d078d2c3dbb5e3504bc60d6321c775cf1bb4621322593d4893b9cccb82726d688a53391696f6d5d87ab41f6c30215ef1f1692ec259ae4d81c92a17b892839993cfb5cb320710266eb740dd54e17b3c0d754894e3e8f94890ed97f18fb28ddb54b4f03ef8b89c0bbbed9af467d428ea6de2627b089f079c9f4d35bb54a326c85217608fa68ae"}, {0x98, 0x0, 0x0, "a997bf2dffb142a38ad9a5c30f480de5c9c67efb1bc140228c13b68a061f6e4b66f298e9b2be44aac86a7051fb7ec9e263f2ea186a8a9a625a3a0dcc0542d6262383a22e7208b317b5b13e73fe8fb2a50d36d717ad781a83857ca6a611e0f04c85e1f3dadeca953c07ffe165e4efb173da511035d51a10079703993a8f030281463ec2958220dae6cf33e24c"}], 0x23c, 0x10}, 0x4000084) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000027c0)='/selinux/mls\x00', 0x0, 0x0) getpeername$unix(r3, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) 06:51:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:51:59 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getgid() 06:51:59 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:51:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00'}) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:51:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x0, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x5) 06:51:59 executing program 2: r0 = socket$inet(0x2, 0x80005, 0x9) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x40, 0x4) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(0x0, 0x40000000, &(0x7f0000000000)={{0x0, 0x8}, {r2, r3+30000000}}, &(0x7f0000040000)) r4 = timerfd_create(0x0, 0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x301000, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x40, 0x12) wait4(r1, &(0x7f0000000040), 0x2, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) [ 2782.890327] audit_printk_skb: 1950 callbacks suppressed [ 2782.890353] audit: type=1400 audit(1542351119.572:240477): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2782.962500] audit: type=1400 audit(1542351119.642:240478): avc: denied { dac_override } for pid=15368 comm="syz-executor5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2782.969304] audit: type=1400 audit(1542351119.652:240479): avc: denied { dac_override } for pid=15367 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:59 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2782.984116] audit: type=1400 audit(1542351119.672:240480): avc: denied { dac_override } for pid=15371 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:51:59 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x106, 0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x110) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:51:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2783.025271] audit: type=1400 audit(1542351119.712:240481): avc: denied { create } for pid=15370 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:51:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:51:59 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000080)=0x9) [ 2783.026118] audit: type=1400 audit(1542351119.712:240482): avc: denied { write } for pid=15370 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:52:00 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:00 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)="1ccf7831694f820998164eda2e802093309619fe2398577b7b331f2b3a36cbd9a19177ded754b7139ee0483ea3a92dc3db056c43b6003c1d3258846c05e501c9490aecd35377bfbdb9efd4ef49d6f936805489719f5046ec11427f525135e70e477d4768db8a992fd0cd8b8a862f014e120403f93864933823e824952f59a4c3881eda4b1d8a31187d696b848e5603f12c4b8b472bde664e60176eed3e65dc58d631", 0xa2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000200)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xf8, 0x14, 0x1, 0x300, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x5}, [@nested={0xe4, 0x4b, [@typed={0x14, 0x93, @ipv6}, @typed={0x8, 0x57, @uid=r3}, @typed={0x8, 0x15, @uid=r4}, @typed={0xbc, 0x29, @binary="4bd3d9050367d0a80baf1add24bfbf60ca8c201d9bb308bc097b85f984f595d19c4d09cd5c75dc27666961ecd527dfec214ae88e3ce6f0ad61371a4f65ea4005a3a59b8ec705e84d9306fcb9aad2fab96b45701629d7a6d5017cf997419305b205805f43cd4ac5003b0deecd932367766d0a142047db65a77ff57221adeff80d62993f52a159d8dd461681f921a40301f94e958c7cc589ac35a4d9bb6dc09798bacd3316af52043b9f132c6e0330987c51c10f80a036"}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20004040}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) [ 2783.032239] audit: type=1400 audit(1542351119.712:240483): avc: denied { create } for pid=15369 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:52:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2783.039946] audit: type=1400 audit(1542351119.722:240484): avc: denied { write } for pid=15369 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:52:00 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2783.070916] audit: type=1400 audit(1542351119.752:240485): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2783.077584] audit: type=1400 audit(1542351119.752:240486): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:04 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) syncfs(r1) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="7269185d7892a824521428a98356ff82310a70687ddad1a9746c383e2af6fced666a205e3b80e4406c77e79ef0e4da1480f34faab8ffbf4eacca", 0x3a}, {&(0x7f0000000040)="05111b323c8d0cc4a3edf22d634283548eeb9d5ecc29229ee1d361246b32e7bf3685c0b8613165617d1e8956798d5fb73a144f5d5aedf96ba14031505d7931ab7b38c783be2147b8382cc383194954ca9d1f42d3b4e50fdb7c84", 0x5a}], 0x2, 0x2) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:52:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x46c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x254, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x46c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:04 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:04 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xfffffffffffffffe, 0x10, r0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:52:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:04 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:04 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0600"], 0x2, 0x2) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000180)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x20000000000, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x40000101100, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:52:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20002, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000008c0)='./file0\x00', 0x3) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) nanosleep(&(0x7f0000000000), &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) 06:52:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2787.893088] audit_printk_skb: 1224 callbacks suppressed [ 2787.893096] audit: type=1400 audit(1542351124.582:240895): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2787.914754] audit: type=1400 audit(1542351124.582:240896): avc: denied { sys_admin } for pid=2086 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2787.916373] audit: type=1400 audit(1542351124.582:240897): avc: denied { sys_admin } for pid=2086 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2787.921145] audit: type=1400 audit(1542351124.582:240898): avc: denied { sys_admin } for pid=2086 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2787.923414] audit: type=1400 audit(1542351124.612:240899): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2787.925259] audit: type=1400 audit(1542351124.612:240900): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:05 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x14}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) prctl$setname(0xf, &(0x7f0000000000)='\'\x00') timer_create(0x5, &(0x7f0000000080)={0x0, 0xd, 0x2, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_delete(r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) syz_open_pts(r2, 0x22801) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) [ 2787.927181] audit: type=1400 audit(1542351124.612:240901): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:05 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000240)={0x2cf2, &(0x7f0000000200)=[{}, {}]}) r2 = timerfd_create(0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) ptrace$setregs(0xd, r0, 0x8001, &(0x7f0000000280)="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") readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000380)=""/3) r3 = syz_open_pts(r1, 0x80) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000180)) write$P9_RLERROR(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xf) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'veth0_to_team\x00', {0x2, 0x4e21, @remote}}) tkill(r0, 0x1000000000016) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)) [ 2787.929033] audit: type=1400 audit(1542351124.612:240902): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2787.930835] audit: type=1400 audit(1542351124.612:240903): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2787.933722] audit: type=1400 audit(1542351124.622:240905): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x1) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df5741500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003e090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:05 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:05 executing program 0: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:05 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:05 executing program 0: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:06 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futex(&(0x7f00000000c0)=0x1, 0x8b, 0x1, &(0x7f00000001c0)={r1, r2+30000000}, &(0x7f0000000200), 0x2) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(r0, &(0x7f0000000040)='attr/current\x00') setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000080), 0x4) tkill(r0, 0x1000000000016) 06:52:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:06 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x744) sendfile(r0, r0, &(0x7f0000000080), 0x9) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x120) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) 06:52:08 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x8000000000000003, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000040)={0x6, 0x20000800, 0x1000, 0x1, 0x7ff, 0x40, 0x0, 0x4, 0x4, 0x7}) tkill(r0, 0x1000000000016) 06:52:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a8, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:08 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:08 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:08 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0x10021) pipe(&(0x7f00000001c0)) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RMKNOD(r2, &(0x7f00000000c0)={0x26b}, 0x3f) fdatasync(r2) write$cgroup_type(r1, &(0x7f00000003c0)='threaded\x00', 0xfdb1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) 06:52:08 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:08 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:08 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0x10021) pipe(&(0x7f00000001c0)) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RMKNOD(r2, &(0x7f00000000c0)={0x26b}, 0x3f) fdatasync(r2) write$cgroup_type(r1, &(0x7f00000003c0)='threaded\x00', 0xfdb1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) 06:52:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$binfmt_elf64(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:52:09 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x43c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x224, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2792.908627] audit_printk_skb: 1908 callbacks suppressed [ 2792.908635] audit: type=1400 audit(1542351129.592:241542): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2792.933532] audit: type=1400 audit(1542351129.512:241526): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2792.935242] audit: type=1400 audit(1542351129.612:241543): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2792.936452] audit: type=1400 audit(1542351129.612:241544): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:09 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x2, &(0x7f0000000080)) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:09 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x4a0, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x288, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x4a0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:09 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2792.937744] audit: type=1400 audit(1542351129.612:241545): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2792.938968] audit: type=1400 audit(1542351129.612:241546): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:10 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2792.940397] audit: type=1400 audit(1542351129.612:241547): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2792.941597] audit: type=1400 audit(1542351129.612:241548): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2792.944837] audit: type=1400 audit(1542351129.612:241549): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:10 executing program 5: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2792.946440] audit: type=1400 audit(1542351129.612:241550): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:10 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}, 0x8}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e89e07800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:52:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x43c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x224, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:10 executing program 5: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x8200, 0x0) fallocate(r1, 0x28, 0x3, 0xca) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) io_destroy(r0) 06:52:10 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:10 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) io_destroy(r0) 06:52:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '-+[selinuxkeyring'}, {}, {0x20, '/dev/keychord\x00'}, {}], 0xa, "7188f2acbe3c210356d2304e44892924c1286c5288d374cda2f6982c4e21ffdcc5bc5e7aac9d012f909c1fb45cd3befb8effd608669003e36a1ac4e06ab702441122b779c76b8ea027a285c2f32840755df24ab581bc65a19e3e3c77a6dd74baf0e32f9e637de41509382d5bb1d23eb92ee816bfc5199df688b21d3a8489775840927f625ccbb7b1e22872d344692cea5bd1b71f82b6f7682e3995b300118e7bad7b4a660a1aeeac887fe124c0"}, 0xdb) r1 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x40}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0xa00, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$int_out(r3, 0x5460, &(0x7f0000000180)) tkill(r1, 0x1000000000016) 06:52:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x0, 0x2, 0x6, 0x0, 0x3e, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x0, 0x38, 0x0, 0x3fff80000000000}, [{0x70000000, 0x8, 0x5, 0x7, 0x8, 0x6, 0x9}], "", [[], [], [], [], [], [], []]}, 0x778) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000008c0)) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xffffffffffffffff, 0x4}, 0x10) 06:52:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x43c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x224, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:11 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 06:52:11 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) io_destroy(r0) 06:52:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) pipe(&(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:11 executing program 5: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], &(0x7f0000000040)={0x4000000000001, 0x7}) io_destroy(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fsetxattr(r1, &(0x7f00000000c0)=@known='system.sockprotoname\x00', &(0x7f0000000100)="408e6c6f00", 0x5, 0x0) 06:52:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) unshare(0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000080)={0xcd, {0x7, 0x65, 0x5, 0x0, 0x100000, 0x3}}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x5) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)=0x20000) write$binfmt_elf64(r3, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x0, 0x2, 0x6, 0x0, 0x3e, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x0, 0x38, 0x0, 0x3fff80000000000}, [{0x70000000, 0x8, 0x5, 0x7, 0x8, 0x6, 0x9}], "", [[], [], [], [], [], [], []]}, 0x778) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 06:52:11 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) io_destroy(r0) 06:52:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x400000000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x20000000004, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x2, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x404, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x404}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:12 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:12 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400100, 0x0) mkdirat$cgroup(r2, &(0x7f0000000080)='syz1\x00', 0x1ff) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:12 executing program 4: io_setup(0x80000000000003, &(0x7f0000000080)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], &(0x7f0000000040)={0x4000000000001, 0x7}) io_destroy(r0) 06:52:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local, 0x0}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x564, 0x0, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x290, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x5, 0x400, 0x7f}, {0x4, 0x1b2, 0x7, 0x1}, {0xcfa, 0x1, 0x5, 0x1000}, {0x2, 0x179, 0x800, 0x100000001}, {0x2, 0xd74, 0x6}, {0x7, 0x4, 0x6, 0xfffffffffffffffc}, {0x9, 0x6, 0x81, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}]}, 0x564}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:12 executing program 0: io_getevents(0x0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:12 executing program 5: unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x800, 0x0, 0x9}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) getgroups(0x6, &(0x7f00000002c0)=[0xee01, 0x0, 0x0, 0xee01, 0xee01, 0xffffffffffffffff]) fchown(r2, r3, r4) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r5, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:12 executing program 0: io_setup(0x0, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) fcntl$setflags(r0, 0x2, 0x1) lgetxattr(&(0x7f0000000380)='./bus\x00', &(0x7f0000000440)=@known='trusted.overlay.opaque\x00', &(0x7f0000000740)=""/200, 0xc8) writev(0xffffffffffffffff, &(0x7f0000002980), 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f00000006c0)=0x100000000) listen(r0, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x1ff) r2 = memfd_create(&(0x7f0000000180)='syz1\x00', 0x0) write$P9_RFSYNC(r2, &(0x7f0000000240)={0x7, 0x33, 0x1}, 0x7) sendto$inet6(r1, &(0x7f0000000380), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$selinux_context(r4, &(0x7f0000000000)='system_u:object_r:crontab_exec_t:s0\x00', 0xfffffffffffffe84) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000640)) r5 = creat(&(0x7f0000000480)='./bus\x00', 0x2) write(0xffffffffffffffff, &(0x7f0000000380), 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) fstatfs(r5, &(0x7f0000000840)=""/252) select(0x40, &(0x7f0000000040), &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x5}, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f0000000280)={0x77359400}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0xffff}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f00000003c0)=0xfffffffffffffdfa, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000340)) 06:52:12 executing program 5: unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x404, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x404}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:13 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)) io_getevents(0x0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:13 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r1, 0x973f854eb7afc6b) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:16 executing program 2: r0 = gettid() setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x9000000000}, 0x28, 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x0) timer_gettime(r1, &(0x7f0000000140)) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000680)=""/4096, 0xfffffffffffffec5}], 0x1) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f00000026c0)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000002680)=[{{&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000280)=""/213, 0xd5}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000180)=""/35, 0x23}, {&(0x7f0000000400)=""/133, 0x85}, {&(0x7f00000004c0)=""/70, 0x46}, {&(0x7f0000000540)=""/151, 0x97}, {&(0x7f0000000600)}], 0x7, &(0x7f0000001680)=""/4096, 0x1000, 0x3}, 0xffffffffffffff00}], 0x1, 0x40000000, &(0x7f0000002700)={r4, r5+10000000}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x2000, 0x0) ioctl$TCSETA(r6, 0x5406, &(0x7f0000002740)={0x618, 0x4, 0x9, 0x7fffffff, 0x4, 0x6, 0x1f, 0x0, 0x65d, 0x21d}) clock_gettime(0x0, &(0x7f0000002780)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f00000027c0)={{0x0, 0x1c9c380}, {r7, r8+30000000}}, &(0x7f0000002800)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:16 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x7ff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000200)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'bcsh0\x00', r2}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000180)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r4, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:16 executing program 5: unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:16 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x404, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x404}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x743f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x744) socketpair(0x9, 0x80807, 0x8000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000080)={0x6eb, 0x400, 0x6, 0x6, 0xfa, 0x1000}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x24200, 0x8) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000140)={0x9, {{0x2, 0x4e21, @multicast2}}, 0x1, 0x5, [{{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @rand_addr=0x3ff}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e22, @multicast2}}]}, 0x30c) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2799.672405] audit_printk_skb: 2592 callbacks suppressed [ 2799.672413] audit: type=1400 audit(1542351136.352:242416): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x40) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2799.703254] audit: type=1400 audit(1542351136.392:242417): avc: denied { dac_override } for pid=15716 comm="syz-executor5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:16 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:16 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000140)) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x3c4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1ac, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x3c4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x9, 0x200, 0x4, 0x3ff, 0x3, 0xffffffffffffffc1, 0x4, 0x902aa14, 0x200, 0x7}) getsockopt$packet_int(r1, 0x107, 0x13, &(0x7f00000000c0), &(0x7f0000000100)=0x4) unshare(0x0) syncfs(r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18, 0x1, 0x0, {0xb8}}, 0x18) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 06:52:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0xdf2b9da5) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2799.750664] audit: type=1400 audit(1542351136.432:242418): avc: denied { dac_override } for pid=15717 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2799.790251] audit: type=1400 audit(1542351136.472:242419): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2799.792004] audit: type=1400 audit(1542351136.472:242420): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2799.796341] audit: type=1400 audit(1542351136.482:242421): avc: denied { dac_override } for pid=15715 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2799.799284] audit: type=1400 audit(1542351136.482:242422): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2799.816138] audit: type=1400 audit(1542351136.502:242424): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2799.818072] audit: type=1400 audit(1542351136.492:242423): avc: denied { create } for pid=15720 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2799.818517] audit: type=1400 audit(1542351136.502:242425): avc: denied { write } for pid=15720 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:52:20 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1e, 0xb, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x7e1, 0xd, 0x5, 0x7, 0x1, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x7, 0x9, 0xb, 0xffffffffffffffff, 0x15}, @ldst={0x1, 0x2, 0x2, 0x3, 0xf, 0xffffffffffffffff, 0x1}, @alu={0x4, 0x1, 0x7, 0x9, 0x7, 0x30, 0xffffffffffffffff}, @map={0x18, 0x6, 0x1, 0x0, 0x1}, @exit, @exit, @alu={0x7, 0x0, 0xd, 0x7, 0xb, 0xfffffffffffffff0, 0x10}, @exit, @jmp={0x5, 0x5, 0x7, 0x0, 0x2, 0x6, 0xfffffffffffffffd}], &(0x7f0000000180)='GPL\x00', 0x721, 0x10, &(0x7f00000001c0)=""/16, 0x41f00, 0x1, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000280)=r3, 0x4) 06:52:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x384, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x16c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x384}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:20 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000280)={'syz0', "e21fcad2cd84ee1c45364084e5d470ceb739a2f376031b25b805e823642c439246f2648274cae4069bbd2c13727127c8a7f75072a45db608f8e991e1ba9b7aa54ebaab320ad1d2b7319f58ab4e270f68c6b6914119432c59c34e20d040829393def1c2d04b26f29dbe68c02f3f16152783103db61206dbf37c9712a31edbde9d5d9a8cbb70837f0a14601e1b569cb0fc1a058ea37c5acf96f5d4d28062fc2f61e35e9a6d1b53f5dc034c9552b85108b37a7de231d80ee759198bb806473be2177c4c8e92b9b87f68e2b02ff1009af306e9cd2da5ad4f5f99e66091b1aa316e649017db1b930642d7956ede6da11abcec579db2319271d9394dfd1889a660289594753ba5528e51f16d3cb4b5fb6c24aa70c2fde85c82001daa59d10ff2b7daac7cc96ea8ee565a2e1b5b10a2eb8473fa1a25d297a64ef6887ab4161fc7925519f5a2520b610aa871c0a3e47649f536ac9c310a5bfa6f1f472f7d0b338a9efe2cc383aa7043b43480a6d7f6564ea565ef01d38a6722687d0e074260fbc279a7d4d0c4883ead46fe717e947701dc20544fa298b242dda7a825d99e3a651a0ce68d934d6ad81ccfd092f4402d4a32767c1fa71e36bfc1b8e8e02572c4deb04966de83a57c83fdc48bef6a00d62bf81e3bf080564e8dc846c512ad38633f7c06f8f2e5ecde07b1626adf37592bd861ee5533b72b1d801f33df2a9f04a7b773a4ac006b9b544f4d4501f50200d9f94c97cd308f23a7cc4e0818117eea9a8d3765d6d14602333ef3fe706f92d7e2e53e4929b13bb0e8132335b727ecf88c5933990e7014592f0c4ec1bb63100c5a9becf4201db1e8b95a90d879b57723dab71cae9f18cc6704d8e0e88c657d6f01f108fb6cb566667621745fdaed868efa5a829137ace16655ff32076f19cc3456d26dea414fcb21362d9c644ef75b0f75319c57c5a2094ecabd14b05fdac5324a898d2974ad44248f831c492894e014116ecdc6095b116aef82e6b455a649e6a103f4c570e9eec15b8e8ad8b807867da4f406d6bc988a0d11bf104851d973cc53b9db2c0312f773905b6280f860b40ada8ed4914f3991529838d41410e376355660097b58277e4dcd2d5e359f1a81bb0620352eaf4a7d1db56084ce71fac1addc9b282a6cc09f74a7e08d539856cf24888d16acadb9c816cb7c19660d4d95cb662e74ef86660ec68bc27e27fb0860299600fb1489b592ec8d0ce8e1c9e6f12bd8d624415810dac94f605ae10536be4f7ff4a8e3a8e97fd40f6578ce8ef6489630e6dff58c52d1b4fefc4d288fe9cde2531e65c30437f21e2d983845d50f9a4085bf26d30462d314aac52d34f78e57d066d5288b563830ef94d33850cacf6bd76b5f1332b60b2e9bd111eb63c35de9a9e2637c9c9a41ad770009d5884a369cfd7f81145b265e303c4fef66b96d2a78ad316dc5c2ba9660624cac2a3313eda1e1540c0451b0f757c8115af0bcf536553a1307a96f5adcccfad1caf2e924091b57e6fe3f701e30a0cbab7da749e01f3224ed58a1201c51ad7e7c5843f833cfb0fafce97b6ce065e5e697ebb0f990ac523c82d9d220f0f1026315d8077f1dfe083a23e398c94519d839b8dc1500f347d18cb9103cfa139f120d07425fca50980ea135be3dd194e39968e8339a30f57aefd5ef647fee66a0ab00c14cbd088ca0f6287e3f1286e0b51fab78bd70b1fa4c3275f7a26dc6ebd0c9d7ed8aadb99975fe58c16fd19441bd9ea7110932123d505e6631edf14adf9771849b03185a7c8f913f7c504ebeeb6662e4a59c6d2480a546112f1cd9d9fd30adfbfa649fc593325dc337be973a6ffebbf0e669f653c7f402b24f21d30dadc261464af80f46633e1cf73d08cd1a58489d28895ba3aaf1aa87c04bedd5fc08a83db28bbbc5f82353eb86dec884a43314c53ed9ded93c59e7d98a88d17bcba572b87d1e6b00c1dd06e2a99c8b552b476e3fcf90730da69a9fb90f5b58114813c2378e9a3daa86fbb4f5ad27e13aa8bbb213baee9596f72020bd962e4b6aeb8b5dfa65e50199a77d8b45550364540554746636c23f74b811ecca8d297a539c3c73a1adb7619f3a98ec770b4b1be4c6d6c69a1838476bb3f057c47d4d6a52797ec092ad0c89d7c10886e78f4d11e37e9db04c7080e82ca8444a72e45de11352f5dd84907cdde243331ae5ccd156efde3cd04457c027989654eb03c4985f4aee72a0ee50c31ebac02233cb6d1162548918db5e3358355bd3a34ce7ff5bbaa4675c06c09d315fe4ede18da807416048fc5b39e58da2f17533239b011df3a48b3e3b947712eb0312ec29fac82e968c232cc3fd3bcad70f28f5f73340f6b146fbaf071468109a835d32b0b5f69f0d9bc83078b48ee20b41878ba62ed9e205c80257f969308f12318ec9c7d01bb980aab84b507144915095fb2a54d0c7c82ed68444f757d87c0fcabf92b61a27ed70c14398b514ad5a89cc6192826978311b8816f765e9d3a25a9712bc4bfef8fa3c8a3ce75d17297ae1a7bacd3bf75bd7f3cdff4a1e48b10ebd3ef1b8493a72f0247068f4071589fd4ded8fdc8f6690dd6e3e1ddaae05a831e26ee1310b5244c43369f48cab1147ff59f630f7118199fc5b03ad33218a60f9377190d863348c634fa97890cdbfea653a9f846493279fd8231b3a452c0835dff141b70866805e39dc8bdefb3df6845d7be157d9e02cac184f699ad0ee244386c2e7558b33142a7efe7e6154f8a53cf26b3d2e4edd3875428de397d1d8b566199ed13aaadf92b4b7ab8a6d356cbfa70a6eeb6de7b0a05ba38bfb765dbe09ee62fd5057d830367964548401ccb2362768f01d705931702982458209575beca3489834535c477716a0125630d2a978a3c238f08f32dc08952745a676c745577d0e7c7a4f3858814d5e3b48d353bf857e744d31f702a513c79b6b770ca468a9c2405eed2727c80772dcf95204f4a1491de0794e21d189d0d0912f85e3724d3dbf538931b7397ef810e70d3e814ae46dfbe0e1631ad422d519ea4563fb6e6e524f67431ce2b87f79f3702f12f976167160f60789d80bf46945f7982679519b2c46487b35a27a0cac99be7aa3f3b2ac4c579cbc1dbaf8d81a138538a3e6bd5ab8436e51502b0fdc853fb7a2d6dff20abe42090a13055d46e0afa85b37c9a8c9e4d1920e80d897e179cef130ae27395af9d3c67225454e0b712d2bab503309e01b47c1ec4e4f200e2710371d0eb2810ce9ceae891fc0f98a205a1c6814ae2a3bda08b6f3c7ba5603f7c215d2fef2c73989e9cda377a5a308204a7c34bf8ccaab97028d3e0dc4ae1dcc00385daf10c2b915044c0dc080a99041398d640f4a69dd74ec78788b0b6dd082ca0c1b6b6d408a76b7a0fb44fef330d9cf04b40d88a092957bb81fd21b630f95c63d5aad580384f7509d54d2f8721e0f5662af4ceda87bbfa34264e8bbe45e382e78608cb22462e32b9f3eac2db3fba6a9f4c128d7143d0c468e0e4cf61d2d657e632eb133b47d441e7d0dd6b4be377b5e62d3dc1c0cfb409d334ac21c6cdea5198b333a32069f4e414c73655ab9c38e911e5bca7f165e9e7f95adc7b1796335ef2ba90da42bae1d0db2ff1a9d2c58846a9d1bb5df8a3773026d80c4c99f8c3fd805a6d64a1be9e2e477a261ae6af65e9b4e10485bb0d027ece61efa4fd5da82859f00368c3f01d200f3aaae66f51e464e46ba67066bae5c5d9c81601cc721a7e14be495e2f3e28137246907bee87665aa10b39233b2980784331b4a7c56757d380a4c876148261109c9ea16d5c076d73131b56751c0ac4638ae8a7cfac17a90eb50b5b4418ef2989f1c9186ba45b52fc95dfe43ffff612137b5d1f6e5abac0c8db7334372bb8138ec27f2282118f3474fc3c72920a106ccac629aef8e33382bec8d75cc53327d5b36a4bd23cd10d6239cb2b2ad8bce32e596bc8216df66655d4c0cc24e7d2b62b63a3bb368c08a9477bb27ce8fcbfee4f28b5f022a2979b1973c0c73faa7ea49797c0d80862110803be7343c707f14ffbb75f2f77af890e3c550ccfc3882b5a9a3ee5e0c64495b4707ad30ef333f6c5a4893ec41facf751d2e7e6c546ce813557d0ae7bb415aa7e87bc44a6092c01dceea372aeb235dc2df397a7c0ea6596c3b81d528abc0ee8477bff96dcad8510cdf289f47d6aec4f28c770f8ee0c6290ad6b193456e0b268a02b31e4f5fff1d1e03de1118a89cf38bc77f3ce5c96b84897619c232f9cfe915857b1041c4bce30550fdf00cfa0d8b30aeb984aa711f2da499566901349361ad428f8d9cda6275cef1209d9a8d79072c48049bfc3f65d1eeb15e85d568afc9db0d0e510e349962ba37a8454988a985eeef12dae9d90244484302709835b7e961f510fa0fe99007a22ae6adc6cf9cf2ffb599c71a6e6f761e624107e8585233bb1e74e4ac977c4ee05429389c25bedeac903633573e935eee8968fb9306de2627f987cc992134f7208658ea8bab85e0e6e6c0816b20aaaeaaffb361d98b9a8d54207b878bc56a5629932767f423fa95c907fc5ef9a3561752dedf1c4af63da4e239dbbdcaf5e732d866344d14a68bd34832e3fe02e441f3009f3a027a1f66846af07190ef77fc1e1c90fa4ddd7d75265f93bd865cc8250409175ac7db22cfce0207dfeb3a11c3e0daebd105f47d2e54dc3d2ddf43501bf16767913d2f2048bebc5b12629a403e653310e81456cb4e5b75e79ac58551a754e4f324d03771a9c278353ed6a213f9a34b14ef650a87c4ea228ce29d6fdc3cc284fe618b6bea9dadc822514c7ac8fa3da904f9fe8aff38b899196a80a6fa14a7b0968f65eb04e54872244b5e02e7099143e115c7fdbe3058d8bf36943f94c91e409902656b12cd966122cef5bddba0beae6574a55953832a701a714884c3471f00cd828574596c55ddd1b42d4e2de3c3729b72cb5d44c5b2c111b7481236defa8755711c09560133bbc3f62d5e95a45fc1ebd765ee9d7d2864a36bed9f95d1685a9d6622f89d6bfa9d1f8d2a51351a31e332b6a19e89e7c25b7a176dcc003bcdb68b7e1673ffa4b9578f5c7d3f426e3af54578aae5cb14d3853c97f72b05c4c8db4dd21b0e26b563e0f1f8dc894134aca5e2e430cb45fdd97032bae848c1409d3ca17ef0999ee9712db1197e77d1520bb4a59cfb19e4f2caf6cdbe4e8bdf99e8ef088ace6639c813c6a76a79b53f5dcfde59dcd8ed9589d43884ff3538042b51d44651adfdb5a7914de8b9467ed09b6c492747c9350804cc4bfaeae9632c51bf21ef6d5dfeab873f49e5fe1ddf001128742a051eab323719e613040b6be18cd24dda9605d23c6aedac49dd5069462efe81df40fdc88f37e81a7c44614e09444e5f744db0f0882ad249df2af6b209ecfafc81055a46f33334019a7e87cea74d6d10c24e0098db2dc9fb3738e163b4321334ebd992bdffd3ecec3a8e5f6281366ed93048f2c94c4f7ec3f7cc876f2823e059d69aaf98844d14f79e7755a4af453ec3ffa9bf529a1300e14f1df4fa0ba11a880ea7736ec8f2c5af5b905cce92c3b97246e2cb1c61a2ae250830588fca45cdf8d71ce19ab5943efb606df0ca5c9442c2032a134996570209765ba14831a87666c4ab5c35c19fc91d2f862822ba921f6aaab3b2b3d3b5cdef9d4764b15e6afbc31aedf75c36642059b466a518f3a7c2be038ff122917ba93d327207f27472cfb362a294c3029442ade2dd1de533656f988345ab0f9525980ae871023ceec7f2b4d41aa60474b39becbb28aebafa29edc77e0779b3b3491006b6c8ccb4b26abf08828e"}, 0x1004) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:20 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='gretap0\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:20 executing program 1: r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x133) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000200)=0xfff, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) write$FUSE_INTERRUPT(r3, &(0x7f0000000040)={0x10, 0xffffffffffffffda, 0x5}, 0x10) r4 = fcntl$getown(r2, 0x9) timer_create(0x6, &(0x7f0000000100)={0x0, 0x28, 0x2, @tid=r4}, &(0x7f0000000180)) nanosleep(&(0x7f0000000080)={0x77359400}, 0x0) 06:52:20 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000180)='security.SMACK64\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', 0x19, 0x0) alarm(0xffffffffffff5efc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0xbe18c03c970aa6b7, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3) 06:52:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) syncfs(r0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000180)={@local, @local, r2}, 0xc) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x14) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0xfffffffffffffe1f) 06:52:20 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000000080)=[{}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:21 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001280)=r1, 0xe5f39446f6fac86b) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3, 0x400012, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x4, &(0x7f00000001c0)=[{0x3, 0x1, 0x0, 0x2}, {0x845, 0x100, 0x3, 0x800}, {0xe93, 0xfffffffffffffffa, 0x100000000, 0x3}, {0x7, 0x7, 0x8001, 0x4}]}, 0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x8, 0x9, 0xf7, 0x0, 0x7fff, 0x200, 0x1, 0x0, 0xff, 0xff, 0x6, 0x80000000}) fgetxattr(r1, &(0x7f0000000180)=@random={'btrfs.', '\')$userkeyringsecuritymd5sumself/vboxnet0security/\x00'}, &(0x7f0000000280)=""/4096, 0x1000) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:21 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000000080)=[{}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x384, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x16c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x384}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2804.443820] binder: 15783:15787 ioctl 80047601 200001c0 returned -22 [ 2804.527276] binder: 15783:15788 ioctl 80047601 200001c0 returned -22 [ 2804.683145] audit_printk_skb: 1179 callbacks suppressed [ 2804.683153] audit: type=1400 audit(1542351141.372:242819): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.729230] audit: type=1400 audit(1542351141.412:242820): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.730985] audit: type=1400 audit(1542351141.412:242821): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.736081] audit: type=1400 audit(1542351141.422:242822): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.740345] audit: type=1400 audit(1542351141.422:242823): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.755651] audit: type=1400 audit(1542351141.442:242824): avc: denied { dac_override } for pid=15791 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.767835] audit: type=1400 audit(1542351141.452:242825): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.769690] audit: type=1400 audit(1542351141.452:242826): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.779290] audit: type=1400 audit(1542351141.462:242827): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2804.785693] audit: type=1400 audit(1542351141.472:242828): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:24 executing program 2: r0 = gettid() r1 = eventfd2(0x0, 0x80800) pwrite64(r1, &(0x7f0000000040)="c1074b855f87534f7b57d5ea381e37512922dfd559", 0x15, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000200)="866c7df78cb186fb8f810fd01b836befc088e8e71232e1ddced005c5db1893436a26636bb08cb342ffd0ed954de3af81774fc9844c03614fdfbfe1de79878e5608bc3979c7a66239a6ddb52be11a39060fc632b0192316e8ec1c7f3ef93a05a603280bf23ae2bca9138d7b74cf83fde2fc876335625ec2523695fd28ea1d1a09d031a32ff8d9edee0e45d3ea5168f1e9fa53725aa23452e257416333c68e484f0ccba1f4bdd8be6bde13912f371bb6ff", 0xb0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x280000, 0x0) timerfd_settime(r3, 0x1, &(0x7f00000000c0), &(0x7f0000000180)) r4 = timerfd_create(0x0, 0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x384, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x16c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x384}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x384, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x16c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x384}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x12) 06:52:24 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x101080, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007000)=[{{&(0x7f00000003c0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000440)=""/38, 0x26}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x2, &(0x7f00000014c0)=""/178, 0xb2, 0x101}}, {{&(0x7f0000001580)=@nfc, 0x80, &(0x7f0000001700)=[{&(0x7f0000001600)=""/217, 0xd9}], 0x1, &(0x7f0000001740)=""/237, 0xed, 0x401}, 0x9}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001840)=""/144, 0x90}, {&(0x7f0000001900)=""/237, 0xed}, {&(0x7f0000001a00)=""/52, 0x34}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x4, &(0x7f0000002a80)=""/111, 0x6f, 0x2f00}, 0x7fffffff}, {{&(0x7f0000002b00)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000003e00)=[{&(0x7f0000002b80)=""/45, 0x2d}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/45, 0x2d}, {&(0x7f0000003c00)=""/7, 0x7}, {&(0x7f0000003c40)=""/165, 0xa5}, {&(0x7f0000003d00)=""/137, 0x89}, {&(0x7f0000003dc0)=""/58, 0x3a}], 0x7, &(0x7f0000003e40)=""/4096, 0x1000, 0x100}, 0xd357}, {{&(0x7f0000004e40)=@ax25, 0x80, &(0x7f0000005580)=[{&(0x7f0000004ec0)=""/249, 0xf9}, {&(0x7f0000004fc0)=""/205, 0xcd}, {&(0x7f00000050c0)=""/142, 0x8e}, {&(0x7f0000005180)=""/34, 0x22}, {&(0x7f00000051c0)=""/153, 0x99}, {&(0x7f0000005280)=""/209, 0xd1}, {&(0x7f0000005380)=""/117, 0x75}, {&(0x7f0000005400)=""/221, 0xdd}, {&(0x7f0000005500)=""/124, 0x7c}], 0x9, &(0x7f0000005600)=""/170, 0xaa, 0x3ff}, 0x5}, {{&(0x7f00000056c0)=@nfc_llcp, 0x80, &(0x7f00000057c0)=[{&(0x7f0000005740)=""/114, 0x72}], 0x1, &(0x7f0000005800)=""/165, 0xa5, 0x7}, 0x6}, {{&(0x7f00000058c0)=@can, 0x80, &(0x7f00000069c0)=[{&(0x7f0000005940)=""/4096, 0x1000}, {&(0x7f0000006940)=""/69, 0x45}], 0x2, &(0x7f0000006a00)=""/175, 0xaf, 0x4}, 0x6}, {{&(0x7f0000006ac0)=@un=@abs, 0x80, &(0x7f0000006c80)=[{&(0x7f0000006b40)}, {&(0x7f0000006b80)=""/248, 0xf8}], 0x2, &(0x7f0000006cc0)=""/205, 0xcd, 0x2}, 0x81}, {{&(0x7f0000006dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/125, 0x7d}], 0x1, &(0x7f0000006f00)=""/214, 0xd6, 0x800}, 0x100000000}], 0x9, 0x10063, &(0x7f0000007140)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000007240)={@rand_addr, @remote, 0x0}, &(0x7f0000007280)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000007300)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000007400)={@dev, @multicast1, 0x0}, &(0x7f0000007440)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000007480)={'syzkaller0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000007800)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000077c0)={&(0x7f00000074c0)={0x2c4, r2, 0x20, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x1d8, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xcd3a}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xebd}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xc8, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2ec0}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x59}}, {0x8, 0x6, r8}}}]}}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) ioctl$HDIO_GETGEO(r9, 0x301, &(0x7f00000001c0)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r10, 0x0) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40246608, &(0x7f0000000000)={0x0, 0xba71, 0x9, 0x8001, 0x2, 0x830}) 06:52:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) fcntl$setsig(r0, 0xa, 0x18) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x80000001}, 0xf) 06:52:24 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0xfffffffffffffd2d) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:24 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x1, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340)={0x0, @dev, 0x0, 0x0, 'none\x00'}, 0x2c) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000240)) dup3(r0, r1, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@local, @dev, @remote}, &(0x7f0000000400)=0xc) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r1, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x200000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) accept4$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10, 0x0) 06:52:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000008c0)={0x0, 0xfb, 0x8a, 0x3, 0x7f, "7dfa55f40d2b848a8756d375607d759b", "949c41053f6c9c31df6fe0027220c97dd8c11f05a90224dd0a388236d8f23672a9f4109eb23e0f071f6dae97e8785640da9142a665241acad90859e70c8a033bb4509806063e5f03704031c758c0f73dea5271bcc65441b986dc63fac364c55fe3be9c093f11e24fadd1d6624fbd3d30278e5d0eab"}, 0x8a, 0x3) 06:52:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x344, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x344}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffffffffffef) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:25 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:25 executing program 0: 06:52:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000000)) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) readahead(r0, 0x1, 0x5) eventfd(0x3) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xfffffffffffffff8) 06:52:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000000c0)={0xd, 0x7f, 0x3}) r1 = gettid() write$input_event(r0, &(0x7f00000001c0)={{0x0, 0x7530}, 0x1f, 0x4ea, 0x7}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xb, 0x1, 0x19e}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) write$selinux_attr(r3, &(0x7f0000000180)='system_u:object_r:depmod_exec_t:s0\x00', 0x23) 06:52:25 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r3, 0x209, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x80) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) mlockall(0x1) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:25 executing program 0: 06:52:25 executing program 0: 06:52:26 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e23, 0x85d, @remote, 0x80000001}, 0x1c) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, 0x3, {0x3ff}}, 0x18) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000040)={0x101}, 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2809.700625] audit_printk_skb: 1290 callbacks suppressed [ 2809.700632] audit: type=1400 audit(1542351146.382:243259): avc: denied { net_admin } for pid=28600 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2809.709064] audit: type=1400 audit(1542351146.392:243260): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x10000, 0x4, 0x7f, 0x8, 0x80, 0x2, 0x3f, 0x4, 0x3a3, 0x40, 0x56, 0x3, 0x53, 0x38, 0x2, 0x5, 0x6, 0xdd78}, [{0x3, 0x2, 0x7, 0xf9, 0x4, 0x3e31, 0x3ff, 0x9}], "a0366498e4274222b0c8a0ca63fd78fe36bc80b4b89113f7c8730bcff3a59e795399a9e8696e345ac1783929862f72dc53926d366a77e6412f4876e1d40e49f4262709b79b938134c595600cb31e41c35c3196c7d7503e2d2db692a39235697cfba9896d2ae18145c27e85dc42d46b6bf0669b74501fc291084b7acf709ce903385e079816f8dd0ecb4794c244b66b0fb826fb37ee9bebc4b439"}, 0x112) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x80000000, 0x290000) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80281, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0xfffffffffffffe01, 0x9}}, 0x30) 06:52:26 executing program 0: 06:52:26 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:26 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffffffffff57) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x1ff, 0x4) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0xfffffffffffffd39) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2809.732076] audit: type=1400 audit(1542351146.412:243262): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:26 executing program 0: [ 2809.733817] audit: type=1400 audit(1542351146.422:243263): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2809.735930] audit: type=1400 audit(1542351146.422:243264): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2809.737720] audit: type=1400 audit(1542351146.422:243265): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2809.739183] audit: type=1400 audit(1542351146.422:243266): avc: denied { dac_override } for pid=15883 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2809.744092] audit: type=1400 audit(1542351146.432:243267): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2809.745906] audit: type=1400 audit(1542351146.432:243268): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2809.751318] audit: type=1400 audit(1542351146.432:243269): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:30 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x100000000000000, 0x1) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000cf9000/0x1000)=nil, 0x1000, 0x9, 0x43053, r1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:30 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000280)=""/4096, &(0x7f0000000180)=0x1000) unlink(&(0x7f0000000140)='./file0\x00') fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:30 executing program 0: 06:52:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup/syz0\x00', 0x200002, 0x0) 06:52:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/232, 0xe8) 06:52:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa04eb35228a3fde1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r2, 0x306, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x17a}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x400c041}, 0x0) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname(r1, &(0x7f0000000000)=@un=@abs, &(0x7f00000000c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:30 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0xfffffffffffffffd, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40047602, &(0x7f0000000140)=0x8) 06:52:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 06:52:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4400, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000000}) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 06:52:30 executing program 2: r0 = gettid() timer_create(0x7, &(0x7f0000000040)={0x0, 0x12, 0x1}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x1, 0x80000) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) fcntl$setsig(r1, 0xa, 0x21) tkill(r0, 0x1000000000016) rt_sigpending(&(0x7f00000001c0), 0x8) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000200)) 06:52:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$LOOP_SET_FD(0xffffffffffffff9c, 0x4c00, r0) 06:52:30 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000880)={0x6, 0x8}) r1 = perf_event_open(&(0x7f000001d000)={0x200000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xfffffffffffffffd, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0xfffffffffffffeb2) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000180)) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000200)={@loopback, 0x0}, &(0x7f0000000280)=0x14) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000700), &(0x7f0000000740)=0xc) r5 = request_key(&(0x7f0000000780)='ceph\x00', &(0x7f00000007c0)={'syz', 0x1}, &(0x7f0000000800)='/dev/ppp\x00', 0x0) keyctl$clear(0x7, r5) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f00000002c0)={@dev, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000340)={@dev, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'bond_slave_0\x00', 0x0}) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000400)={@dev, @multicast1, 0x0}, &(0x7f0000000440)=0xc) r10 = getpgid(0xffffffffffffffff) sched_getparam(r10, &(0x7f00000006c0)) r11 = syz_genetlink_get_family_id$fou(&(0x7f00000005c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, r11, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) sendmsg$nl_route(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x82000200}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@mpls_getnetconf={0x4c, 0x52, 0x220, 0x70bd2a, 0x25dfdbfe, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r4}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @NETCONFA_IFINDEX={0x8, 0x1, r7}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x7}, @NETCONFA_IFINDEX={0x8, 0x1, r8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_IFINDEX={0x8, 0x1, r9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000008c0)) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000900)={@multicast1, @broadcast}, &(0x7f0000000940)=0xc) r12 = mmap$binder(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x40012, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r12}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x1132}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)) 06:52:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x441ff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040)={0x4, 0x1, 0x80, 0xfffffffffffffeff, 0x7}, 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2814.703239] audit_printk_skb: 1281 callbacks suppressed 06:52:31 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000280)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000d72063036d70d4cba22f167edc84e267ae9f25db2c2b84f3d8"], 0x80) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r4) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2814.703247] audit: type=1400 audit(1542351151.392:243696): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) renameat(r1, &(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r1, &(0x7f0000000000)='./file0\x00') 06:52:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0xfffffe67) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:31 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000700)={&(0x7f0000000080), 0xc, &(0x7f00000006c0)={&(0x7f00000015c0)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x3c}}, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x75affdfffffffff, 0x0) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='aufs\x00', 0x2000, &(0x7f00000002c0)='md5sumkeyringposix_acl_access\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 2814.714288] audit: type=1400 audit(1542351151.402:243697): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.716701] audit: type=1400 audit(1542351151.402:243698): avc: denied { net_admin } for pid=28600 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.718519] audit: type=1400 audit(1542351151.402:243699): avc: denied { net_admin } for pid=28600 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.720594] audit: type=1400 audit(1542351151.402:243701): avc: denied { net_admin } for pid=28600 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.722094] audit: type=1400 audit(1542351151.402:243700): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.722497] audit: type=1400 audit(1542351151.402:243702): avc: denied { net_admin } for pid=28600 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.730793] audit: type=1400 audit(1542351151.412:243703): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.765475] audit: type=1400 audit(1542351151.452:243704): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2814.781920] audit: type=1400 audit(1542351151.462:243705): avc: denied { read } for pid=15977 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:52:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) dup(r0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:34 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x77359400}}, &(0x7f0000040000)) timerfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2bc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xec, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:34 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000140)={'system_u:object_r:dmidecode_exec_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5'}, 0x60) 06:52:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000040)='\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r2, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000280)={0x3, 0x0, 0xa000}, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) 06:52:34 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) pipe(&(0x7f00000097c0)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000009800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009840)=0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = epoll_create(0x9) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) ioctl$int_in(r4, 0x5473, &(0x7f0000000040)=0x5) 06:52:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x75affdfffffffff, 0x0) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='aufs\x00', 0x2000, &(0x7f00000002c0)='md5sumkeyringposix_acl_access\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 06:52:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockname$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) 06:52:35 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000180)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x402c5828, &(0x7f0000000140)={0x0, 0x3, 0x4, 0x9}) write(r0, &(0x7f00000001c0)="b90fff015bcb219ce29ab56a4e3c3cafb1d8e960d8dc41a3e2e8d0471452406b0f6958a8ccf116ed539447753399f1b450200fc5b11592a946f48fde5dd93ba7d4e17b4452d68e3a", 0x48) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x211) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2c4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000009c0)={r1, &(0x7f0000000040)="cca4d93e7ca20d7f1da46b179c30e853d159b6b23518bf69525bf390f4f471700e12103f2fc48e754d93c3358f2a6e232c82ba33a72950037b038b037a0058e11883316a4bc40091702d08f917958e6e55bb13a14ec2b11a26dd92afa71208f50967483de8f1686b71fe742f8e6f26521668afc5860d8681355c50a0bec59eaf22872edc7131c5dd995bb080bcfe37ecbece69820f33e772e15ac63ccf36888b7a949e3d69b8c682a6b1e0d98b5fc0a79c62fb501b", &(0x7f00000008c0)=""/203}, 0x18) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x744) 06:52:38 executing program 2: r0 = gettid() timer_create(0x1000000, &(0x7f0000044000)={0x0, 0x12, 0x200000000}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockname$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) 06:52:38 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000780)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) shutdown(r1, 0x1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000940)={0x8, 0x100000000, 0x4, 0x100000001, 0x7, [{0x1ff, 0x2, 0xe1, 0x0, 0x0, 0x488}, {0x4, 0xfffffffffffffffd, 0x1}, {0x9, 0xffffffff7fffffff, 0x5, 0x0, 0x0, 0x1000}, {0x6, 0x8, 0x7, 0x0, 0x0, 0x101}, {0xfffffffffffff000, 0x9, 0x5, 0x0, 0x0, 0x200}, {0xff, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x980}, {0x20, 0x7fffffff, 0xffffffff, 0x0, 0x0, 0x80}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r2, 0x5, &(0x7f0000000600)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x966d02ba39609890, 0x87b3, r1, &(0x7f00000000c0)="cb177e0710734eb2a3269ced049793e06b2d33954a490168905e5a94079a5e560e578ebcb3f3f4c2e3d272c4c57bae9825bb41c32252113cf3a3782eb2840cec2702ef1214d9863f421ef6cc589e6be185def5b0932b56076aefbe969c", 0x5d, 0xfff, 0x0, 0x0, r1}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000000180)="ad210adb561b6efeb5f3d066d92b99bdb7a6bb487e6cd356bc42308637e40bc0a76d715bb40d904298df10a90cb3a329bfffa0b632d78cf123379995b8796c37d84595e21341ffaf7ec35011ddd198d9f214eee1b659c2946a3097153fb7f716f5261ead188292e47eba50443ff9060210a64131a527ac36e4714743c8e6ac4266070f203070d2604ad16a1367970696ce38ddf18981f4", 0x97, 0x1, 0x0, 0x3, r1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000000280)="06b30ab6ce2c6075ccfc11f6117f1d5673c7cd2b5918aef9aa3c08995c5ce7fcd20623bd92aad0967b2b7ac581beb539ba02bda62881f9d21982ff259dd3eac66878734cb533384a37d96db0d14f41cf95b7db12e2d4fff2c5c3268151e7ca3721ebf2eea84bcea4a35bbfa5c5317653e6aa89a9ec49b9ce454b042a75c023a2bbdd76ecd9d0206084881c9dd0ea56181e025df24d704f6a170f3e0578f9a435b39673684e14f4d0cfb3eec14b297569956706e847674ca4a991269cfe8fc40b7d1b76fe6922f4e876cdb3cc8f6e1b72aafd227a49e076518702491e52a11e48aff74fcf9f671770fd1a2d0f27fb13ff3c067550b2050db192be3c", 0xfb, 0x10000, 0x0, 0x2, r1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000440)="86830e8ed21524f8559dfdbc9b3d56755387a16ccf36af752cbfaa96416377e659ad5acb08b7a24a60183b301b572927d98de150c7de884c4ae5117baee6e25d95ae74f4a2530b885b544094590bdfedc5159365c15076640ae8bb00e93a852839b455585dcd5b51994840893a09ec1faa379a2eea305fa80d1be41b2c248505c06ad82bd60c", 0x86, 0x8b8000000, 0x0, 0x0, r1}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x9, 0x3, r1, &(0x7f0000000540)="550e745aa21c5a34ec2a05ada89c77afa7db759e1f54cb7467f0eb66252795dee1d567102bf4b85136810d6f647ff0e089e964be801d713291855da63c3acbf652fb9b6e601d9044763df77ad59365715e1434f421a4d7164fd6c4bf99cf0b6cc3d1e7e2b205bef616d058ed21f56a1bbbc68d7a", 0x74, 0xffffffffffffffc1, 0x0, 0x2}]) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000640)="a7a33c910401810a105b5770174bce929302181271f17be3f454a62e924a151ad9b3b46cee8d0348e88621727b62935799219c938b97656500edba730b9217cf18f7c2c93a5c548bec44480b84f553a8d2f5c24f1d6564fdf2b591ba1afa6bc3eac79153fc1b8c2eff971519a015f4bbc160f665f23b35bb63ca356368254704fefffbbe137061a539179fc6d04a57542694b446bf7fd9549105c1d5bc3d45973cd423d860960bc78f3cf9071499338753f13779b251ec252153d0871ba6cf32fd3a4203ba04c7216a133c873ee11081e85c7d57e8091ba4ca1b") 06:52:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2c4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2821.742012] audit_printk_skb: 1644 callbacks suppressed [ 2821.742020] audit: type=1400 audit(1542351158.422:244255): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:38 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2821.812172] audit: type=1400 audit(1542351158.492:244256): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2821.827391] audit: type=1400 audit(1542351158.512:244257): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2821.831686] audit: type=1400 audit(1542351158.512:244258): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) [ 2821.836219] audit: type=1400 audit(1542351158.522:244259): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2821.843862] audit: type=1400 audit(1542351158.532:244260): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2821.871913] audit: type=1400 audit(1542351158.552:244261): avc: denied { dac_override } for pid=16110 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:38 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000140)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) connect$unix(r1, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) lseek(r2, 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2821.880110] audit: type=1400 audit(1542351158.562:244262): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x404, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb50}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4ed}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4000}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x404}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2c4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2821.887338] audit: type=1400 audit(1542351158.572:244263): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2821.897458] audit: type=1400 audit(1542351158.582:244264): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:42 executing program 2: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = gettid() timer_create(0x2, &(0x7f00000001c0)={0x0, 0x10}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f00000002c0)={'veth0_to_bridge\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x16) 06:52:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2c4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'stack ', 'keyringvboxnet0]#keyring-vboxnet0\x00'}, 0x28) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:42 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x1f, &(0x7f0000000200)='[\'system&cpuset^nodev/!selinux\x00'}, 0xfffffefa) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x0, 0x4c, 0x2e, &(0x7f0000000140)="4a5cd2deb3f4d44dc182dff34279d6bfdaff004a91d5a469231426af47c0b455068a46ef2a67b31767af6d38261f14f362c3cf839bebe678f6a1dc06282464b9987e31398172db22f1f3bb69", &(0x7f0000000000)=""/46, 0x8000000000000000}, 0x28) fsetxattr$trusted_overlay_redirect(r1, 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffdf6, 0x1) 06:52:42 executing program 0: io_setup(0x80000000000001, &(0x7f0000000100)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 06:52:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000180)=""/26) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000f40)=ANY=[@ANYBLOB="ec040000", @ANYRES16=r5, @ANYBLOB="000429bd7000ffdbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="400102004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000500000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="bc01020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="080007000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000014000400070003ff090000000000005400800000"], 0x4ec}, 0x1, 0x0, 0x0, 0x4081}, 0x4000) 06:52:43 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x121300, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) ptrace$setregs(0xf, r2, 0x9, &(0x7f0000000100)="6113199eb2e9976cb002e81d679a9767c4973a57e35572a0258a326c7ac6eb981cece71a164349145d3a9d0d6f5177e70690d130b0b140355d4da76cac16672e16c6616c4c5855899822c4afee2d7098acf336cc24ffa3ff29bf185b467f365d3f3c47bf5c1611b70ab2b65918b1b3099ae244dfb6c676ce4d8afc3e75e731f64c45a27f33a7221f40ec3908a92c2693863a2d6a6471c86e0c8afc679ab39fc0c9fcde44025150e49c47b69bde53d150f255924a329a38fda8e2ea0c03d4545c4dd88bc2dc46a3d236d52499f6668da973b406bf855dc061df4a017e200ad049fd279c") lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0x7, 0x8000}, {0x5, 0x7}]}, 0x14, 0x2) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:43 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000000)={0x1a8000000000, 0x16, 0x4, 0x8, "a0c5dd8764cd0d6ec29bb684d6b7410adca792b5fb2b3e4c53f3553fdf4932b0"}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000000280)='./file0\x00', 0x80, 0x300) pipe(&(0x7f00000002c0)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) pkey_alloc(0x0, 0x2) 06:52:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x4001, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2c4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2826.755488] audit_printk_skb: 1032 callbacks suppressed [ 2826.755495] audit: type=1400 audit(1542351163.442:244609): avc: denied { sys_admin } for pid=2086 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.771533] audit: type=1400 audit(1542351163.452:244610): avc: denied { dac_override } for pid=16203 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.780067] audit: type=1400 audit(1542351163.462:244611): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.781859] audit: type=1400 audit(1542351163.462:244612): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.810136] audit: type=1400 audit(1542351163.492:244613): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.825550] audit: type=1400 audit(1542351163.512:244614): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.826850] audit: type=1400 audit(1542351163.512:244615): avc: denied { sys_admin } for pid=15010 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.826860] audit: type=1400 audit(1542351163.512:244616): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.832285] audit: type=1400 audit(1542351163.512:244617): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2826.837141] audit: type=1400 audit(1542351163.522:244618): avc: denied { sys_admin } for pid=2085 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:46 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000001680)="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", 0x1000, 0x0) r2 = add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="2a98c8", 0x3, 0x0) keyctl$negate(0xd, r1, 0xfc57, r2) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:46 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x4000, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000100)={0x60, 0xfffffffffffffff5, 0x8, {{0x6, 0x4, 0x7fff, 0x8000, 0x9, 0x200, 0x0, 0x6}}}, 0x60) 06:52:46 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x1d, r2, 0x1, 0x6699, 0x6, @remote}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x0, &(0x7f0000000040)=""/48, &(0x7f0000000080)=0x30) write$binfmt_elf64(r0, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x4, 0x800, 0x7f52427, 0x7, 0x3, 0x3f, 0x401, 0x247, 0x40, 0x36d, 0x2, 0x3f, 0x38, 0x1, 0x0, 0x9, 0x7}, [{0x4, 0x2, 0x1000, 0x5, 0x3ff, 0x9, 0x7604b24b, 0x40}, {0x6, 0x8000, 0x40, 0x6, 0x6, 0x401, 0x7c061ec, 0x8}], "5871203f225469c9f37a0d458972efad83f7ca377543e0dcb9097ef1747d5eaf9813bf1f05568e60a760baf08f4c7adc7e82c093fbd11c4fc114c40a1598ddd854c1f2ad23d47db034428eec8c2112e776eddfa5fb44655017293a1d5f69811fb6f2c0be6993d6c0ae1a6f02254685b2533d5ad3794096b55e71b49f20a00732a2dcb8797486829c7a4d9cfef3ec41b3c04bbbe31a6c4928ab881668ef3243f7e1955d09354f004e5875d1eb7987586728dd09f386826d24b5fe721c249f27c9e052ddac34ee7426fded225b1805e3b3707629fa01c6", [[], [], []]}, 0x486) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d80)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000e40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800080}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x14, r3, 0xf02, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x24000040}, 0x40000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000e80)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:52:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x8) write$selinux_create(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797374656d5f753a6f62797366735f743a73302073797374656d5f753a73797374656d5f723a6b65726e653030303000a21f000000000030303030000000000000000000000000"], 0x50) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e24, 0x2, @mcast1, 0x80000001}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:46 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x1, 0x4, 0xd51b, 0x5fc, 0x0, 0xffffffffffffffb1, 0x80000, 0xc, 0x7fff, 0x80000000000, 0xffffffff, 0x7, 0x1, 0x2, 0x663c, 0x5, 0x7, 0x2, 0x0, 0x4, 0x100, 0x8, 0x9, 0x6e, 0xfffffffffffffff8, 0x5, 0x7, 0x6, 0x2, 0xffffffffffffffff, 0x147, 0x2, 0x0, 0x1f, 0x6, 0xbd06, 0x0, 0xffff, 0x4, @perf_config_ext={0x9, 0x5}, 0x800a, 0x2, 0x68, 0x7, 0x4, 0xfff, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x3) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000240)) io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r1, 0x2, 0x8000000000001c4, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) ppoll(&(0x7f0000000140)=[{r0, 0x8}, {r0, 0x400}, {r0, 0x2c0}], 0x3, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)={0x6}, 0x8) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000200)={0x1, 0x3, [@dev={[], 0xe}, @random="fb8c0f2a520a", @broadcast]}) iopl(0x5) 06:52:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'ifb0\x00', {0x2, 0x4e20, @multicast1}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000180)=r2) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:46 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0xfffffffffffffe24}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x1, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x6c3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfff, 0x8, 0x0, 0x0, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10, 0x80000) 06:52:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:47 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000340)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x80, 0x7ff, 0x40000000000000, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) ptrace$cont(0x20, r1, 0x2800000000000, 0x10000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000380)={0x20, 0xfffffffffffffffe, 0x3}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ftruncate(r2, 0x200) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0xfffffffffffffffc) write$eventfd(r2, &(0x7f0000000180)=0x6, 0x8) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x40010, r2, 0x1) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x102ffc, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000300)={0x5, &(0x7f00000002c0)=[{0x80, 0x4, 0x8, 0x1f}, {0x7, 0x100000000, 0xffffffff834066e3, 0x5}, {0x100, 0x1, 0x200, 0x8e9}, {0x9, 0x80000000, 0x401}, {0x7, 0x8001, 0x2, 0x3}]}, 0x8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x400, @remote, 0xaa}, 0x1c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) tee(r0, r2, 0x5, 0x3) 06:52:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x7e, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(r1, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0xfffffffffffffe97) 06:52:47 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000140)={0xfff, 0x8000, 0x8}) 06:52:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x4, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000100)={'bond0\x00', 0x1}) r2 = gettid() fcntl$lock(r0, 0x27, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, r2}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip6gre0\x00', 0x10) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:47 executing program 0: io_setup(0x80004000000003, &(0x7f0000000100)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:47 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000001c0)=""/33, &(0x7f0000000200)=0x21) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000180)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) write$P9_RWALK(r2, &(0x7f0000000240)={0x9, 0x6f, 0x100000000}, 0x9) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000980)={0x1, 0x2, 0x4, 0x9, 0x9, 0x6, 0x3, 0x9, 0x1, 0x7fffffff}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0x3a, @multicast2, 0x4e20, 0x4, 'nq\x00', 0x9, 0x0, 0x7}, 0x2c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) sendmmsg(r1, &(0x7f0000000880)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000040)="6a7b28a38775ea007125359df7eae238ff3c2474cff878ddb6493b728f0dcc7c53e622b4d42b6530b6bf89115a6feec84c1aeae64b34d60445", 0x39}, {&(0x7f0000000180)="2d556fa0ec283550e356e99d0688136c5167d2eac6294a9417141c0fbcbafe665668b08688d0b1c71036e339a94b012a7f041120166ff64ff22b78c5196daf4c811bc206fd22671e541bb1ec4f8ec64bb7b8707d9f53d4167a35777afc3e5098ee911d96bf0bf46938ed2bd2a9c8cd5bbb7efd314d9405aebc8bfe8e741bfbd4e48724b57304a65adc6907beac64626ddd8338c3f7720c07341a857acd323c6890dcaeadd0a600cfbe361412c09206dd4670dee99cdb0fdb7f86df8626764a39a21a2fee5bb6e410bce2ebd81ac85edf634d16215e571dca6c993b3cd637b1210ff2145d8ae71c7ced3fd71a5224460416eebf48", 0xf4}], 0x2, &(0x7f0000000440)=[{0x2c, 0xda87c88758e08e87, 0x0, "cf1918e066490c3d028c9cb85335fcaf1a71a029db8b77c2944433e10f"}, {0xec, 0x10b, 0x7, "4bcc05b1482366907ae929bd2ed0aa174d294d80609e9909d4104a166faed829d889f6c36da7f3f2a9f26b61eaf3f987b79d140ceffdd6bff0759d435ab8e49ff4d345fab23a39886947ddcc2e11a7ceccd0ab39558041cb312b032a2415be14baa3efcafb9e828119b4150e1e7b59c4eac43202b5e0a1a146c6440e7f882dc8fa89b7b3028fd30869f1613427b93a68ab08c5b267f73321062d9d1bae65d5d95a21b061eeac47b861bf520d2b609d071e7eb7d023b2daf6a90a25fc0dfc123eb3cbbd982bab4eaca1b7f42d2d1704c798b9a4c3238fa008b8ea9c0b05"}], 0x118, 0x880}, 0x6}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)="31751e287332eaa6a5d81993bf21e885ecc8cd630062c30569687e06ead84983046b9768d5c4aabcfa8395f59d47667ca451847e42b35a0440eab0f478c2d997315a94245daf8e3b5afe9c2147199357892044dcdea13b1a94026a2826c360636da44dfbb410e301b5b1a090f01acd659cdfd9b705af0a558457aac1d0434b19991a64b03f33690837aaeb039cdbbb1330869aaedf9cb0", 0x97}], 0x1, &(0x7f0000000580)=[{0xc0, 0x10c, 0xffffffffbde3dab3, "f15327c2998787203f1c227255d6da6f7a3552ee9f045feab0b414926459af247cea802b3f8675c611d1ba7971253d6334861fb879e2ce1c6f1903465938458acb6814df895064c4d32de7c2feaccb65562a6de77896d438e714d9e44adfc1a2f356e4cea766b44f4d1685da0b5f0b046f04b77de1d64347dc09933afc3c9e993d1b898ef9ff35d46a21e885a7addefce14187abe45d90d00adfe4cbdeca2d7b3a196b851148dbf27797a4a161603c2af4ad3498"}, {0xac, 0x3a, 0x7, "72e56efba3035f39aa8ba786058199c8bac12b241b411b7a1ad8fb3547f626e0532f6bf31e607ed11b5abbc872443d3a36f6d6b02a9c94f6073ca5072a0e524bf3a89f7f673b1ccef7fb9e9c45f3927b436cb5ee2bdc910a7653b632e7eaee4301102ff0bc008419a32e83ff6ec8cf355323abc2fe6b99e0559494416b95a43da427f244d527657ebdf04ea59ce2fed010eb471a9f717ed0eb848c7d0e9692"}, {0xac, 0xff, 0x7f, "bced3405fa40b04e3a0e468efa74e0afea1ea359c22f2eb649fa618806d35044ef484705b9d5ca458bc82b46ed2c62ec6ee9803e4c70018c824a4096806995cf6fa3e3055b47392666a6a24c05df0c6796c017d44b06e2030d41f4babae777fc4fc8ac1e62784fd77aaaee38832d90121e6e575d7277bcaeba11df62e0967c4dbac639d93b576f55a312d941abb28b165d96a2ecc87251d44c4ce4ad895f"}, {0x48, 0x0, 0x9, "a2ea8f62e02e5b6842e941a7a25e4521668fbbccabd7dcf0960b9eef9e4e5694879a7ed1c865bcc79e641f08029e5c5a56ad0208759b68c51adb1974"}], 0x260, 0x20000000}}], 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:48 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:48 executing program 0: io_setup(0x80000000000004, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:52:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup2(r0, r1) write$cgroup_int(r2, &(0x7f0000000000)=0x9, 0x12) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:52:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:48 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000002e00010426bd7000fc83330077000000", @ANYRES32=r2, @ANYBLOB="fbfff2fffffff2ff0000070008000b0000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000001}, 0x8015) write$selinux_context(r1, &(0x7f0000000180)='system_u:object_r:lirc_device_t:s0\x00', 0x23) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x3f) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2831.766722] audit_printk_skb: 1616 callbacks suppressed 06:52:48 executing program 0: io_setup(0x80000000000003, &(0x7f0000000080)=0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0x40) write$9p(r1, &(0x7f0000000100)="fc70ac361da941b1394b352d800ac8a03926506b91ba541bd59cca0e41526f47630540076af5caa303249e6ee918e99b76d56073c91277a17f4bd29341f1c2ede32d75d68aecc15190d916b49f66d91d044691683122e76af3a77ef5b8c80efdc644e596c10267151b3f626835677ce043335cbf6edfe87b11227c7fa7cf5eb5b32e591ec599fdb1e6c9b8dd6b42b8cd18ee4e51562ab746987eaca5343b43f37cc480b3aa912e673557ea4cc17d7d67c962030a0c81e21ea54c865f8c0e53523173c3349d799a8a6ad2fb4bba7adc9ceac51542f1fdf74cf2ce84bf", 0xdc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'ip6_vti0\x00', 0x2020}) io_getevents(r0, 0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) [ 2831.766729] audit: type=1400 audit(1542351168.452:245160): avc: denied { net_admin } for pid=2084 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2831.772823] audit: type=1400 audit(1542351168.462:245161): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2831.774672] audit: type=1400 audit(1542351168.462:245162): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000000)={@remote, @local, 0x0}, &(0x7f0000000100)=0xfffffffffffffee9) bind$packet(r1, &(0x7f00000000c0)={0x11, 0xf7, r2, 0x1, 0x0, 0x6, @local}, 0x14) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r1, 0x8}], 0x1, &(0x7f0000000200)={r3, r4+30000000}, &(0x7f0000000240)={0x9}, 0x8) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000440)={'bcsf0\x00', {0x2, 0x4e22, @loopback}}) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r5, 0x500, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffad}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000001) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'team0\x00', 0x7}) [ 2831.776715] audit: type=1400 audit(1542351168.462:245163): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2831.778504] audit: type=1400 audit(1542351168.462:245164): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2831.780247] audit: type=1400 audit(1542351168.462:245165): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:49 executing program 0: io_setup(0x80000000000002, &(0x7f00000000c0)=0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x1, 0x4, 0x0, 0x100000001, 0x1110, 0x9, 0x400, 0x100000001, 0xb7f1, 0x401, 0x4, 0x5a92, 0x4, 0x8, 0x7ff, 0x33, 0x10001, 0xfff, 0x81, 0x94, 0x6, 0xfffffffffffffff7, 0x5, 0x8, 0x10000, 0x5, 0x2, 0x6, 0x2, 0x9, 0x1, 0x7, 0x6, 0x3c, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x1, 0x4, 0x9829, 0xf, 0xc98, 0xff}, r1, 0x10, 0xffffffffffffff9c, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x80400, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000200)=0x9) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) [ 2831.782101] audit: type=1400 audit(1542351168.462:245166): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2831.804899] audit: type=1400 audit(1542351168.482:245167): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2831.806507] audit: type=1400 audit(1542351168.482:245168): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2831.808193] audit: type=1400 audit(1542351168.482:245169): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:49 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:49 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x204000, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000080)={0x8}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:49 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0xffffffff, 0x0, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x77359400}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000000c0)='bond_slave_0\x00') 06:52:49 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r4, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x10002) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:49 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100)={0x0, 0x989680}) r1 = signalfd4(0xffffffffffffff9c, &(0x7f0000000040)={0x9}, 0x8, 0x800) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400000) socketpair(0x9, 0x3, 0xfffffffffffffff7, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) r5 = inotify_init1(0x800) r6 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x200, 0x0) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) r11 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/attr/exec\x00', 0x2, 0x0) r12 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r13 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/load\x00', 0x2, 0x0) write$input_event(r10, &(0x7f00000008c0)={{0x0, 0x7530}, 0x16, 0xb709, 0x572}, 0x10) io_submit(r0, 0x7, &(0x7f0000000880)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x8001, r1, &(0x7f0000000080)="5f7d47a007c845b5eb30e54d79226515ea89e2113b3679012184", 0x1a, 0x7, 0x0, 0x3, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x3, r3, &(0x7f0000000200)="502f7f394ca543ce0cbfa778d8acbf7c50d2593a245f6b9056dabff9", 0x1c, 0x1, 0x0, 0x1, r4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xc0e5764bb3b53f8e, 0x1, r5, &(0x7f00000002c0)="8d2dccfbe17b85a1a257f0d3948fc8191e1eff86458b9ff6cec11e2cde20efe630f219be9e64b1f8978a99097cccfadbdb731ee20e684239854d5ec899375cb699d75c48baca452bd9bd88c388b035560cbd8583e0d2ef20bea363c875df01d47e84f5472de46195610b3620", 0x6c, 0xfff, 0x0, 0x3, r6}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x4, r7, &(0x7f00000003c0)="90d82473d106f92fd784555d5f6fb768f4f0b53295ae66fcd559a041221ad3f7c5bcdc568d1d7850088cade63ad3b1d7f9767586a090eb73f4e296f5a4f2b5cb4c50119898fb1861c247234c496c4256743aa60409b75a54157cda10407f29acea057094c72a4f8489fc990f1e1a6fbba64392220a47b81826904d2a29493acef780ee2aad9a32ee684c13a459630ff7201b8df81d4b528702a1b642536da5e19aaaec8bda718f9503fef35241b0479197c08bdc8de7dc5eb35583b2d1268c5079bf2076037f95621c03cca87572d6718a7a4f6a3c21a3", 0xd7, 0x8000, 0x0, 0x2, r8}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0xe, 0xf77, r9, &(0x7f0000000540)="7d9bba7cdcd8268b0d6aa6cbb6826041f6891cac8d02bad533e31900c04c6f00b0f669238e9723d77e2abb19f97afe", 0x2f, 0x100000000, 0x0, 0x2, r10}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x5, r11, &(0x7f0000000640)="02be37f32c6cc5bfd8033f8133aba92a5955858c57505a44e907d30a27efd687b368d65119ea3e9e53bc60ea129fe2b1c091c4e50c9dfd83835f2d631044046d9412a87f536fe536aa3914912520d8e9b852a27b0b24ad9fd28685d37b459f797528acfc8c23c6ad3e745d92a206622f8a334e87ea137bea44aa500005ab15f94e578149e2ed975ca3c88a4918b41c34b92e7f549a60a4813af958595b610ab649f929d7d1d586da994a9b3529ddd8827d9eebe8f3715885895940ffbdab15accb0d0a942c616215750d12f4bbe61b6a95ef4f20d5b2d725219a6ca4fb87d180", 0xe0, 0x1, 0x0, 0x1, r12}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x5, r13, &(0x7f0000000800)="c426c6c90016fae70b0822d4b5dedb0fd9438d508cdc7c27ccf4f5", 0x1b, 0x5, 0x0, 0x0, 0xffffffffffffff9c}]) 06:52:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2c0, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:49 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote, @ipv4={[], [], @loopback}, @loopback, 0x0, 0xff, 0x4, 0x400, 0xfffffffffffff4f9, 0x2000004, r1}) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r2, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:50 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) epoll_create(0xee2) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:50 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x42) recvfrom$packet(r1, &(0x7f0000000100)=""/246, 0xf6, 0x40000000, 0x0, 0x0) 06:52:50 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:50 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x0, 0x2710}}) 06:52:50 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) getpid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:52:50 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r0, &(0x7f00000005c0)=[{&(0x7f00000001c0)="b78fbe0edee10c27b2de0abb4f", 0xd}, {&(0x7f0000000200)="f7db685e5843d385460c232db7d976492ea0a2afdd9448c5dfd08e12d0a1dd65a6bcc663e4f2daec240b5dea6b1005c0111bdbed1fc60903926e7bd05961b409c2dcc25560694de0b98de96b57dac35fbb9bad8407f9431961173882a8ec133a69f4440a4d672ff8322865ecd852fd85d2e82c7d6c767f2d4bf132af49b2947ff1b2ff62c89dd9f2304ab9b706e2058e922d8c3082efa4d3ade4a4f11f1beb321d6e8a43c400c61e5b", 0xa9}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f00000002c0)="f6c1f1fcee3864498af2b5b66d9353228343ff036a495d3168ea14a9fd1de8f0648cc9e86699904856ee117638b3508c86a181cef20b0febc13a3e5fcdc7c7e88e07b50f38abf7b3dadad63d625304a7c834c5db4a031b163b4381df52d5b34386983dda9ef2a0228dfff4c8effda90083f787f225592c30bd5e2d4bab5acdfb142939287accf0be26cbe1716da1c27614df82bf8c97d6c30dc2ddc1b9a32c4ddb1ad3aadba0106f23760cf7c84a1b49dd8372f2070ba5582d6c2567b1ca85dbbe3e9bec5b4ce189a655939e4a67eb86ef", 0xd1}, {&(0x7f00000003c0)="41a0eb612fdef092cd81ceb021b653c6116bf0dbaf9fd413a18613b6780e7810d77b535d90adcb17d4433e00407d9a0fcec741159b85874b8805a87d15e70294d1f5bf29e52297da18d059659c21bd178a731d5c344f0348e157210c7d6144f6f56c6f375716187d9757fbea5585da8a39f39def4185c91c200a77713654a8e4cceeec1e24c1e830c79d9ad803772026678a53e0a5668f7805f4c595724f2f0e0a77d42238835d154478a0752609bcfba8f91a878c4dd34d6ccf73415b1451c218d901edd5624420b671acf624e41679b923feb5ebe192", 0xd7}, {&(0x7f0000001900)="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", 0x1000}, {&(0x7f00000004c0)="c1df3c3039e8424706e0f42e4f5514dc1558e6a27dde940ec2b8578c842fa6d95d97f0f1410fce50440d213f5961dd7219a2e720643bcbc9516a963916449ea03cb900e38ae4f008c89fdc6115cfc8911a0d150484396c12dafd640a9a304f78358d7a413901511b02735ac6c5f063d2160d790def76a2fb3e103ef0ea73142b22eb153a5d312c2e82697ef401beb901d3fdea6ca47b4c5b1fd6ccf0dbaf96ed204e75a04eac88fb7bbf860c7d09880b2ecb732185af11bd338ae40183ea54fe13ba7fe0cf581412fde233ce544910bea110ebafb5f9a6dfe78d6b6878e8ab0f8b1d0606", 0xe4}], 0x7, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000680)={0x5, 0x10000000, 0x7, 0x4, 0x0, 0xeef3}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) connect(r2, &(0x7f0000000600)=@un=@file={0x1, './file0\x00'}, 0x80) getsockname$packet(r2, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0xffffffffffffffd8) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 06:52:50 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r1, 0x3) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000001f) 06:52:51 executing program 5: r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) signalfd(r0, &(0x7f0000000040)={0x515}, 0x8) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x15, 0x5}, &(0x7f0000000100)=0x0) timer_delete(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2f4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x124, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2f4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:51 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x5, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100)={0x0, 0x989680}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000140)={0xc, 0x6b, "300b2612b7c5b4e031f36e9bc498e4d603186076c02aab0fe810d63ca2d438860087625ef708bf50e00de3ca7c115d5f99e7656c794b7d4bdc3f01f7c4d3040aa6936036957e1d806cc898fe0aaaa47c44e02dd0b3d5084be77ba9270af7a01794990adca9e9c1f40f9a8f"}, 0x71) 06:52:51 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x8, &(0x7f00000000c0)={0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x101000, 0x21) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000280)=r3, 0xfffffffffffffd8b) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x30000, 0x0) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x10, 0x24010, r3, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r4, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) ioctl$EVIOCSFF(r3, 0x402c4580, &(0x7f00000001c0)={0x57, 0x9, 0x0, {0x9, 0x95}, {0x5, 0x1f}, @ramp={0x4, 0xfffffffffffffffb, {0x100, 0x7, 0x4, 0x7}}}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffd93, 0x1) 06:52:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "9387"}, 0x3, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ftruncate(r0, 0x1) 06:52:51 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x800000000000144, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) clock_nanosleep(0x5, 0x1, &(0x7f00000000c0), 0x0) 06:52:51 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x2e) write$FUSE_INIT(r2, &(0x7f00000000c0)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x2, 0x200, 0x5, 0x8, 0x2, 0x1}}, 0x50) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) chroot(&(0x7f0000000040)='./file0\x00') sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@newneigh={0x4c, 0x1c, 0x14, 0x70bd25, 0x25dfdbfb, {0xa, 0x0, 0x0, r3, 0x80, 0x10}, [@NDA_DST_MAC={0xc, 0x1, @broadcast}, @NDA_VNI={0x8, 0x7, 0x1}, @NDA_DST_IPV4={0x8, 0x1, @local}, @NDA_CACHEINFO={0x14, 0x3, {0x7fbf, 0x5eac6391, 0x4, 0x1000}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000180)={@dev}, &(0x7f00000001c0)=0x14) 06:52:52 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)=0x0) r2 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) set_robust_list(&(0x7f00000001c0)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x3}, 0xc) write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="73797a30f392e9d9ed063c92d3b45e44c4d1ae29ce1755780f54134b8b68000000000000000000edffffff00"], 0x2c) clock_gettime(0x3, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000300)={{r5, r6+30000000}, {r3, r4+10000000}}, &(0x7f0000000280)) timerfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) socketpair(0x1b, 0x80001, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f0000000200)=0x1) tkill(r0, 0x1000000000016) 06:52:52 executing program 0: set_robust_list(&(0x7f00000002c0)={&(0x7f0000000200), 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, 0xc) io_setup(0x80000000000003, &(0x7f0000000000)=0x0) socketpair(0x7, 0x80000, 0x400, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) getgroups(0x8, &(0x7f0000000500)=[0xee01, 0xee00, 0x0, 0xee00, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) write$P9_RSTATu(r1, &(0x7f00000005c0)={0x5c, 0x7d, 0x2, {{0x0, 0x45, 0x1, 0xffffffff, {0x40, 0x2, 0x8}, 0x10000000, 0x8, 0x200, 0xb5, 0x6, 'vmnet0', 0x2, ':{', 0x8, '//vmnet0', 0x2, ':{'}, 0x2, ':{', r2, r3, r4}}, 0x5c) set_robust_list(&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f00000000c0)}, 0x8, &(0x7f0000000180)={&(0x7f0000000140)}}, 0xc) io_getevents(r0, 0x7fffffff, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERRORu(r5, &(0x7f0000000340)={0xf, 0x7, 0x2, {{0x2, ':{'}, 0x8001}}, 0xf) 06:52:52 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x6}, 0x2ce) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 06:52:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0x14, 0x26, 0x10, 0xc, 0x3, 0xfffffffffffffe01, 0x3, 0xa0, 0x1}) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2f4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x124, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2f4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:52 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'ip6gre0\x00', 0xd05e83c8d6624bd3}) recvfrom$inet(r1, &(0x7f0000000140)=""/161, 0xa1, 0x40000002, 0x0, 0x0) 06:52:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:52 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) write$FUSE_WRITE(r1, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x5, {0x7}}, 0x18) 06:52:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x4e22, 0xfffffffffffffffa, 0x4e23, 0x3, 0x2, 0x80, 0x80, 0x3e, r2, r3}, {0x1, 0x6, 0x6, 0x50, 0x8, 0x0, 0x1f, 0x3ff}, {0xf76, 0x1607, 0xe239, 0x2}, 0x3, 0x6e6bbc, 0x1, 0x1, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1a}, 0x4d2}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x3502, 0x2, 0x2, 0x2, 0xfffffffffffff7b4, 0x1, 0x5}}, 0xe8) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x2, "86523a7d44362c3b"}) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) write$FUSE_ENTRY(r0, &(0x7f0000000300)={0x90, 0x0, 0x8, {0x1, 0x3, 0x1, 0x4, 0x81, 0x3e2, {0x1, 0x0, 0xa1, 0x80000000, 0x7f, 0xffffffff, 0x5, 0x9, 0x3ee9, 0xfffffffffffff281, 0xa5000000000000, r3, r4, 0x6, 0x2}}}, 0x90) 06:52:53 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f64650000a5241e0000000000023be42a8ad416e9e97dbc06cd9711b86121fbfdd87998127ce16e92dc245d4b0a9d5accef7403c3f72dafdaf080a23b6636161dba5e02916f89262cb849dfc3a76d358ce74cf9b7645fbe27fbeb5332d5f854b75ccf5e6857f0cb30058dcdb99372560f8a8f7aeb1d3b03213390a65880008b0f50045a2e1ece00ab0bc06890df3cb0f54cae33b6ada9b6ae90eb50e7f4d0dbabdbdfb8441cc18a5e0de5b2d8777bf6c360a8f1d03ffb8a1c02c98694c99607e0266d488141a0b091423f43d44433e0593c79700629f47b3d9493f09324cbbbfb8a2c9243d420e0b5aaa9b6"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='qnx4\x00', 0x10090, &(0x7f00000001c0)='}%*(\x00') io_setup(0x7a, &(0x7f00000000c0)) 06:52:53 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) readlinkat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/102, 0x66) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2836.784317] audit_printk_skb: 2913 callbacks suppressed [ 2836.784328] audit: type=1400 audit(1542351173.472:246141): avc: denied { dac_override } for pid=16527 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.794456] audit: type=1400 audit(1542351173.482:246142): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.796179] audit: type=1400 audit(1542351173.482:246143): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.797756] audit: type=1400 audit(1542351173.482:246144): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.903563] audit: type=1400 audit(1542351173.592:246145): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.905372] audit: type=1400 audit(1542351173.592:246146): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.911445] audit: type=1400 audit(1542351173.592:246147): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.924848] audit: type=1400 audit(1542351173.612:246148): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.943627] audit: type=1400 audit(1542351173.632:246149): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2836.948879] audit: type=1400 audit(1542351173.632:246150): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:52:56 executing program 2: r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x9) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000216) syz_open_procfs(r0, &(0x7f0000000040)='net/raw6\x00') 06:52:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) r2 = request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000280)='/dev/loop#\x00', 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000180)="6ad5df85029e52062e51cbe2c9c4fcba87d63e2cba5085c520170447b193ba0630de75096ab8c89b4379cb9f646c3e742c4d3ec9048135aae2e85b50390b56260fcf8b65a42a9a63cf5a75775c97606da49032b55ad53356f1dd22fb421506d0a2985fd54a95598f7adbb8a981eee9ff5e1355d8c444bf2a941b7d9768e53ecceea8834f603a526b5fc7e08d6ebe7bb9a6fe3cf559cf9a3eddbf311c3edb1a5987dfc04887739121ef4715b6cf23a925fa71cbdd4cc53822ab7300988126e843decd12b300", 0xc5, r2) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000340)={0x1ff}, &(0x7f0000000380), &(0x7f0000000480)={r3, r4+30000000}, 0x8) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x269, 0x80) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000100)={0x80000000, 0xeab7, 0x1000, 0xc2, 0x80000000, 0x844}) 06:52:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2f4, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x124, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2f4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x1) io_getevents(0x0, 0x8, 0x800000000000095, &(0x7f0000000080)=[{}, {}], &(0x7f0000000300)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x100, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x2, &(0x7f00000004c0)={r2, r3+30000000}) umount2(&(0x7f0000000100)='./file0\x00', 0x8) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='@:!\x00', 0xfffffffffffffffa) keyctl$read(0xb, r4, &(0x7f0000000200)=""/204, 0xcc) ioctl$ASHMEM_SET_SIZE(r1, 0x40047703, 0x10001) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) ioctl$BLKTRACESETUP(r1, 0xc0401273, &(0x7f0000000440)={[], 0x8000, 0x9, 0xd0, 0x3000000, 0x2, r5}) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000040)) ioctl$TIOCCBRK(r1, 0x5428) 06:52:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:56 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:56 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000140)=0x1e) tee(r2, r1, 0xe64, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r5) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e24, @loopback}, {0x0, @broadcast}, 0x40, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, 'erspan0\x00'}) 06:52:56 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) fcntl$notify(r1, 0x402, 0x11) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', '*GPL{em1+ppp0%self\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:56 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x8, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000380)={0x0, 0x989680}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c15450ffafce4eb5d5d3da2524fa209a0f69e7ab68569b43aefb33f5ef26aba59f", @ANYRES16=r2, @ANYBLOB="000c2cbd7000fbdbdf251100000008000600000000e06c00030014000600fe8000000000000000000000000000aa0800010000000000080007004e20000014000600000000000000000000000000000000001400060000000000000000000000000000000000080003000200000014000200626f6e64300000000000000000000000"], 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xa0000, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x6a) 06:52:56 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:57 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000040)='\x00', 0x1, &(0x7f0000000080)='$)ppp1\x00') tkill(r0, 0x1000000000016) tkill(r0, 0x16) getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) 06:52:57 executing program 0: io_setup(0x1, &(0x7f0000000200)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) set_tid_address(&(0x7f0000000340)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000100)) ioctl$RTC_EPOCH_READ(r1, 0x8004700d, &(0x7f00000001c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) capget(&(0x7f00000002c0)={0x200f1526, r2}, &(0x7f0000000300)={0x7ff, 0x9, 0x2, 0x4f01, 0x2, 0x47}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 06:52:57 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x6}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f0000000140)}) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:57 executing program 5: ioperm(0x0, 0xffffffff, 0x9) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000100)={0x18, 0x0, 0x8, {0x3}}, 0x18) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x5) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:52:57 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xe, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="180000008000000000950000000000000095000200000000001811000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000850000004200000095000000000000006ee9768f8f616ecc4811d40a92a1493ee645"], &(0x7f00000001c0)='syzkaller\x00', 0x14, 0x0, 0x0, 0xb8248924647831d8, 0x1, [], 0x0, 0x3}, 0x48) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:52:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000200)={0x14, 0x70, &(0x7f0000000180)="29ba5e6dedf2919da7f8a9b6c2deb85e2be8a1e9df66b935538bfc1f24a3116af52b544c23ba034083ace0ae7b58acbe436dd96b10890ebfb6b891e2159fb906a80514779c84c505508de912e0d304f6e846eb05dc06461b4300b60ca67da45a6f4b92148a400899ad2de072e3f1f99d"}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x80000000, {0x2, 0x4e22}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e23, @rand_addr=0x5}, 0x88, 0x9, 0x0, 0x9, 0x10000, 0x0, 0x80000001, 0x5, 0x9}) getsockname$packet(r1, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000240)=@fragment={0xc, 0x0, 0x4, 0x1, 0x0, 0x5, 0x67}, 0x8) 06:52:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101800, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000008c0)) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) r2 = socket$inet6(0xa, 0x6, 0x3e0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:52:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:52:57 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) socket$netlink(0x10, 0x3, 0x8) 06:52:57 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '/dev/loop-control\x00'}, &(0x7f00000001c0)=':\'.bdev\x00', 0x8, 0x2) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) r3 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000c40)=0xe8) getgroups(0x3, &(0x7f0000000c80)=[r5, 0xffffffffffffffff, r6]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d00)={0x0, r1, 0x0, 0x9, &(0x7f0000000cc0)='security.', 0xffffffffffffffff}, 0x30) r11 = geteuid() getgroups(0x3, &(0x7f0000000d40)=[0xee00, 0xee01, 0xee00]) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001300)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000001440)=0xe8) r15 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001480)={0x0}, &(0x7f00000014c0)=0xc) r17 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001500)={0x0, 0x0, 0x0}, &(0x7f0000001540)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000001580)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000015c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000026c0)={0x0}, &(0x7f0000002700)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002740)={0x0, 0x0}, &(0x7f0000002780)=0xc) r24 = getgid() sendmmsg$unix(r1, &(0x7f0000002800)=[{&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000300)="e7c995d226c9ebe37913f447b95d10b3efd97dca2e68b25c0b4140f1430b18cd0ca8da324b556801859c34fa4df25f6de896c829bb04daf0446afaea1fdaaa89862da2e74f2ec1c28b4fb1c66f4656312bf9436f6d2aacb8fc0ebf1086bc7be46f526150dc38f71dbfc2e6ad2418d947f55744f66123a80dc21fe551a558af00c567255bad3aa8584b82b09a3139cb1dc16912f09cc4e7ce03c466d9ccfa0e687672557400a027d14b74b28b2f25b6e27646b8beef4d58f081e6a6bfa5b3a4ff956bf9731f144383250fd4bf015bbdf4b86af1b5a7d0cd05ac30fd36f7370d907fc124e99c85f9fd06", 0xe9}, {&(0x7f0000000400)="1f94213a7a8985b9befba31941974e9fb7a461f6d4ae8822c9972b773fa02ceb3a471f968b5042fbbe2a9363b0e4fc400ef6f02e10db1eb973448018b2d02cd4fd1f5c7b544eeba8", 0x48}, {&(0x7f0000000480)="52a84e918cf69452d63e32923788d37175e032ff8e4c8de705a1c9f6193c7afa4dc67d7bd30ee6a961d8e0d25498baf644fc56e397e94f7ce478e9548bbb44eeafd678b8b17b4da59b54bc7072611ef18de53ef9a169533006ff5915028c266fe90988e93d78d6d946f3d8c9ca1412c33261c31d09d2afc326681279fa9920d76d2c26c8d52eb5ec24ccedd5471f5e19a00156f03861eef28b44423fd091a469790cba2cd8b82afc276f3200dc6265398762835508e303c4da9edb994d8ec7274b7689ba216f35d1d9ea76b072c90c66a6b4c2291c38b9863e16bedaafe6", 0xde}], 0x3, &(0x7f0000000680)=[@rights={0x20, 0x1, 0x1, [r2, r2, r0, r0, r1]}, @rights={0x10, 0x1, 0x1, [r0]}, @cred={0x18, 0x1, 0x2, r3, r4, r6}], 0x48, 0x40084}, {&(0x7f0000000700)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000780)="275d7361bbc534301e99983b56aa01bc4a1702863c4726a2021d888d531c9fe02446734b0a7206a3daba8d311ce62b763b0f35f8e029197b13dcb633a24064304de8fb38bb4e5984ce07053f374836f5c0cabf4120d3a3c64e943379c9625633913d972f13d4ecee07fde17c11e4376bc76bdcc0e7a7959110efb7f36a9ded0b3afcb4fbbc555e128347be9081229da149343d4cc95d2103f26b3b4df34f99edb59972bf2814ea472518481fa2359fc021fde78c5a82ced0ddb91ca90f32f9c329dd2ef3eecb32ff501933328fc86342d7bd026d1818e7ffe27fb6c8665d881034f0da", 0xe3}, {&(0x7f0000000880)="ea5973088691372620b4d0242dfdede392908f253a2990894a9c4d6c29ea3336bebbee2c021e10325a48778a0e585efb", 0x30}, {&(0x7f00000008c0)="4daa745a0f1e453c62cad2b2114546ff7d72d778fba4c9bf76efc2dc97699af6", 0x20}, {&(0x7f0000000900)="c4546effe7b1ef68f86e75a663187d7f2abc7cdf2a9baf79b48e5d402e2fe0e6128be0f1ec05c71625b7bcf342320d1ccd541d9b21411310e8c5503993a3519eec8345565c55511ab98810e8c116ee11086c2a137b23063ce5facd34ecc93b97594c36af647c950169d22fd1c718d44ec7eee9b9c522c59987fd439f344ae536f5ea54fed9c1fe3d7d92e3bdc268fe5ee8e0c39d2da3e9e920c7835cfb778965336b2ac87c5f2086c321fcebc4bd1d9261b4eb503880676418ba9f1f2b4cf3fc", 0xc0}, {&(0x7f00000009c0)="2d1b77d8f026091b4c17cd3bf9033f70a4a53187351cd7c9e336b6ca14da823d129db3a6f04825d1c362278f1e60e54b111a5132b19c786213520730de3a3228afb52514329dc8c4980070b86041c97664e932b83aeb6b3e0b1c32e6b41b489fa33d9efc6a3ee8bf7cd9c76b379113482a08ee8b035d4c5abf11cbc060386c3541e1958c1e82ee692bf421d56d8418f98165914e3144d30424c5774a90516d9c77fc775cc18b3f7e9b3cf10972df9041f77a24bdb6d40d997d66fb919db01d217bf75c52d96e74ec4b9c16c6f61a2c551c6ab681e6e41324f3ac7a5c68fcd6ecfe9ae19fa63e7fda07a4ba080b87d0", 0xef}], 0x5, &(0x7f0000000d80)=[@rights={0x10, 0x1, 0x1, [r2]}, @cred={0x18, 0x1, 0x2, r7, r8, r9}, @rights={0x1c, 0x1, 0x1, [r2, r0, r1, r1]}, @cred={0x18, 0x1, 0x2, r10, r11, r12}], 0x5c, 0x80}, {&(0x7f0000000e00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000012c0)=[{&(0x7f0000000e80)="c03e14a3925a3c83a2395bdd36f4b8d05769b5ec895fdceee19ac2f317e13255f946a0b979683d43f7744cce4cc713abf01050e880adcb1dd81bfec0812dfc413be26e9100dbb073175ef2ceb843bc0a6c3a9ebeae80efedb4b37a6083b272bbd13b6ef5fce50a9b8b64d426e96721a01d85a00cb3c6d0df526257be8072ef92bb14bc12b6ec072b4ed2ffccb467c4af45c88dbda2360f1da9617f87df44d2294081c555b39c6103925f2bef9b303d6bbd463e85acd29086cf1dc507064073f025e3e0051ae87160ac50aa66392f01695ac886", 0xd3}, {&(0x7f0000000f80)="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", 0xfd}, {&(0x7f0000001080)="e87c728e4b4c0722da41f9d3cb8846de708ea507ba7d06b20574de463fe52981a398445f9a8af5b2e01bce4a899a538bc6cd5b10683e3958ceea93456fa4eb1990f64f1d84a212c468868b67e4884cd2bdf9d46837537d60ce3ccf19248ace41c568dc39aecafc281331d70190d90cfcb5", 0x71}, {&(0x7f0000001100)="894c02a0d55d6a7c420def2fddaffc9b1986cc775ddcc6593cc1228d954aa92f2e011cc86b2fb2dedbb266c590825e1e2ce356133f3d078dce88db560454c879aa1e38b291cf8eb39144cc730d90f450f173c7b23cd290b62122314090fff7bbcda86403b630512772ebfaf82d00898f2411871605cb907e1990ce53fba12240b51f7f0ed62f61b10879de5d30dffbe9156e456a95b633961c7ff2fa9d364e725a00b3ccd2200a86916ebe55fc1aef258f99c1d9dc45f5a39cf2828b8436f8704e36ba321d9e610cd0356de41296eb20186f7fac48f4ce734a8a8d5d7a3c47", 0xdf}, {&(0x7f0000001200)="d1142ec24e11e98a856fe193d3e75dc056ee0ca286db4aa0faf03af9056494dfd6f2805c6c9b3c1e36f0fee9169503117bcc75119ceab31984f689804ba82ddbf9a237e23a7ccff2a684faf82715b4bbed36956e24e3585f3b365adfa5c25784e46afecf23b96c931f767bfc6785651ca89fc2a7fe87c3f79e40ab62fa2397dcfde33a816bbf7f7234d9b16450c2e3dd433c4cdf1f7a2e5c8d9bbd8939550305facbd6f2e09ff133522ca8277ef3b154055e8c39d826d1b06997378210", 0xbd}], 0x5, &(0x7f00000017c0)=[@cred={0x18, 0x1, 0x2, r13, r14, r15}, @rights={0x10, 0x1, 0x1, [r1]}, @rights={0x1c, 0x1, 0x1, [r2, r0, r2, r1]}, @cred={0x18, 0x1, 0x2, r16, r17, r18}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r1, r2, r2, r1, r2, r0]}, @cred={0x18, 0x1, 0x2, r19, r20, r21}], 0xa4, 0x4000080}, {&(0x7f0000001880)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001900)="dbf0d267bd7dfc2d234195b3267cf0a7fd14a964545ac000daa780a2ffca235b947ec400a6ae6cfebefb2c95221e1e1ba7663859193908dd7faf28cd8a568070a02812ea06962d1bed6a6b9d2477282cd30260497ea6aea89567781eed2dda8a2203e7f7a662a734824732fa92db0bb5a0038e8149e788be6a841a5b394d3a6b307a4d074a43fb70e0a29f03bab6d9788d034738fe08", 0x96}, {&(0x7f00000019c0)="19176c3999ad285e2693fa57b3cc60ad268858856610edab2926263d4fa0588e84b743ffa6d481efa7d6a9bcaf546e5b772ba374bc93a97a12ee52eab23d847ca2961cfdad5134d3218d1b54ce2378d532a98a8ba6f751b6bd1ebe20295ef940d1e86817dcfaa49aad3462452d5408710dd2c86a8ebe772bdf024d33328f9917d75a19a9affc3b502befa3068c3dfa7daa992726f9c24a704839b1373c1c90e2165b68cc7cfdc4defeeb1dc318092c97ec4347430553e8f606", 0xb9}, {&(0x7f0000001a80)="c83e2ba2b1610adecfd9224f6bde5e2db927196714d9adf79e912a4d06e02a34f342c6aeb1a4c0955065450ba309894d1fd9695e5bb76c87e175b85ee2ce5366d67cd497b153099bf139ea650fceb11416e67655a5c6b347ccffe267f2c83f713a0ea0a8adc13763b177f06aa65c09e26b3a0be21b6a09dc489799af77e34275cbddee9580d4b29ef1", 0x89}, {&(0x7f0000001b40)="6da661ccb5d43a1cf6e09293d79a1dc819ad6ec7abf5b9926f621380882c92de1a21911a821447bf01460a06a05a54458937c519537cfbfda79d7cc529e7b9f6fe1d6b96ea3ae7a5a7778d2e96889a0b9a6c8e05304f861981c65e8ca4c822a9d97a566daaa1a4d8503dfc696bb316196b52981560eedae02966d31ca49c2fd9c86e", 0x82}, {&(0x7f0000001c00)="f5626d38648887ce76d736f9cf33b9eeb902c1e8b6d8771af925a8110687d9a0f200c2db47c6deb46b0dac43fd22c256fd5918862942c3085216e170ccd5ea93f16a3e024f7780c31d0cedc6594d57c3bf7bdecec4b3e1225721e54eea6fa2196f90e8daa754136f6717f3f928a5f16a29a48ffd76a35717b3c714fd7f2d85713cbd913484", 0x85}], 0x5}, {&(0x7f0000001d00)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002240)=[{&(0x7f0000001d80)="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", 0xff}, {&(0x7f0000001e80)="527bbabb4f730a331ae7aae62a2366eb0c9b863f2f35b350a2522b99f181e07e180f23c91bc6bdbd3581228e4874d2c1df5ea8be525d565847dbe90398d955ce72461ebcf20f8bad69cd574bd59d937568077d6c52e23b951cd68cdb3015d498015ab21c931463e3bcccbff633b855d7fb13e7eb41666607862eb8f9489413c62c47ac8c6fafc3b4b15581a5c11e15616eb5a1060f7d02b873b89c819a5d0e43e83831e7659a0a255519ad7ef6f292b55f30762129a662beac2fea12e346ca118a2963db938a2ccd802894fcbd301d6647ffde75c0829e0f4690f3d64c98f5b62e4e51bf54e6a2f9895279f1108661b5b81f46cbc224ec0e2a892e07", 0xfc}, {&(0x7f0000001f80)="8376b73b78f66c84d6bf5bbde39eae509656a0d37d7acb52d9f8cec8cc3d4c09b4d57b3d9fafc01d8ef7f6659b000974daa7be008ef3c055bb34d9d839421088cf400ce31afb10ee8bdcd644626e855d207417b01b728163be1083f8974bcee1ef8a6d291178f5c3565d04501d5109d1dad9603b6ef736dfda29017d9a187db47009ee8855ad19d98f53986611ccaa60f818336580fb2738ff78259001701cdaae173012caae3437c5c4c6bc2077183ed6", 0xb1}, {&(0x7f0000002040)="fd8b4710ccddaaf2128e43b7df83f7f6e089898f14b07c91c62eab55a5262c5e2bfaa0c4f41f8e611806843343031dbed45ef72ff91f23632e3bb706d7796b1247f129fdbf3d9c95556a5a92f917795a124e566b48db98d045f820ffd8aecc5563388a8824e3eda217ca0b251cbcdda6525aa15b0954b3213a19e274cf2df4dd2380cd02a929349bde5072c4715d1c84cb627bc19c25335ea40854ba6b202511e660cf80d3c8fc57e5c43e81b09c2ed2008f7db57ea5bb", 0xb7}, {&(0x7f0000002100)="b1baed8a10ad58462c4565a9899d429e3188eae9fd2a5735b5f4155b4b90c50eea3f93cfb2addab20371216b3d9cfeeb2279d33f36f0588f87d4a2ccd070669f049243b5949c64ade9c9539b50a1ed354cb140308e9f4b12ef2acc989ca125cae31ab2f26be33847ef9115426976d95a427281ecd2b9cedbbd557549a03322371be5a2f8a424cd5260b0a2b1bca5fd8b49fbef10aa5377e2fb4e53d9eb1b8c48fc10f1298d9a83b9b0151778c6aab48bc2318a0212a7e8ee6457", 0xba}, {&(0x7f00000021c0)="e95f48e7726d1c9a5267d5f8b0a29a48896dd30e99a21e7fb3320922c68bfca226ab64b1287d91a4e846f04f89ec25533a3687bad730235b9e0752e4a63f2f86dff69315d5d8506fac4dcbe156ad4d6d88a66fc3668f68c8b05c1964ba3c5c0f249d4b130c2fa9ea8c1e178b7028ef3384d2d697ba7fa0b2", 0x78}], 0x6, 0xfffffffffffffffe, 0x0, 0x800}, {&(0x7f0000002280)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000002680)=[{&(0x7f0000002300)="67bc3480f41cb0dea6145971402757ec6df2f707278ba06bfd9681f1c954ce1537b9a37f5424a17bc09051207fe4ada97a4284bb3b8bb55253b4f514bdce9bd9a1a33f11c9fcd20a6fd302892574696edc1d16ca1fd771c8a8dfbef2c72cfecbfda9d0ffdb94e91f6e240d48c5c594098cd960e06858b6613da189b3587796ae90f0e37b2b758ada6fb05f04f1d0c6fd76c425dae6120e30c7a45b06e1042792f89006f7aa3ff7ecb6369d5b986584f6993257879286fc79bfd792db08892cd19ea902b931", 0xc5}, {&(0x7f0000002400)="c206ee27ebab606ea8a189e493948345eb30291b0de471f7ed741010856a4c2db5ee99d927955b4dd88d279003daa5b1982d786b75574a5095644805f8de1cbcefe1df8e71eba18fe8226dee6d7e2d5e37ed409ed7e9b0f42e0c2480f21189cbc2324b7507249f5fdb46a4e21323d74e567393c342eb2249a76665fd8e7ac1a5aae23bcab7899e0c3f41a8d2547f916f6f1dbccbdcc1c40a5c1269c80a50661014bacee9bf60c99ff1c88debb2ceffcc58b5149e5d082f0ae3e71bd362552b6f2f195fdf29a217cad1c80bc91d241aafa8c1110fa7a38c6bfb020e20c9f7bd62a7a9a0aa5abaef421e408c16e8d4cd91706fe7b272102c", 0xf7}, {&(0x7f0000002500)="f589119598a461ae3ceae455021630e69174274e2c085e97ff9ec985f3eadc7cb02286b1", 0x24}, {&(0x7f0000002540)="f553f0a60a8797a35226398e160e3474a63d23c54de996846047fec1263544b9eb111eaba4de294629791ddd484ec909bbc2363bbf59293658e5d47ed547debb5051fbdb34f8d5927a1f30b09bfb15e9dabdbc9ef7582431b2dd5e62b3d6a4f7411522113a9bc1532baea7eb796a130783d681b0dd4f06", 0x77}, {&(0x7f00000025c0)}, {&(0x7f0000002600)="5d3883c88f", 0x5}, {&(0x7f0000002640)="ad32fc54199153abbc63a796ac983d8d7600589547e20f5349c05ca9d694820ab1a94d68a3575e17a77e24252d1cadc47bb96e", 0x33}], 0x7, &(0x7f00000027c0)=[@cred={0x18, 0x1, 0x2, r22, r23, r24}], 0x18, 0x800}], 0x6, 0x4) 06:52:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7ffffffa, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(r0, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0xfffffffffffffd3c) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x284081, 0x0) write$binfmt_elf64(r1, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x200, 0x4, 0x4, 0x800, 0x101, 0x3, 0x7, 0x4, 0xffff, 0x40, 0x67, 0x9, 0xcfd, 0x38, 0x2, 0x8001, 0x6, 0x9}, [{0x6, 0x4, 0x0, 0x81, 0x0, 0x400, 0x7, 0x1ff}], "ca02abdc0162d1970304982a1a1142c9aa43367962f044e104308174f2b0508c0337e9c099573be0093b26b35766732757cb82f608095ead3cfd0285a400045cbc48750f5aefc85a42c637b1074cce2924ce3ee6735388d05aeb4134cea8fc285bcdbc2445a65a15723bb4ea91d012b77a80cafaa0d446ef52ca6790688299450eb59d970ae4792116829ede65e3201abb655b3a35189432d7390b66ba4fd13717651b43b6f297818f6ffe8adbfdcb3dd319b58369b80c4c03133177f8701bb12b73f62584cd037f5338b2bd12d5c59f5fe40a38", [[], [], [], [], [], [], [], [], []]}, 0xa4c) 06:52:58 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2841.794455] audit_printk_skb: 1629 callbacks suppressed [ 2841.794463] audit: type=1400 audit(1542351178.482:246694): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.833652] audit: type=1400 audit(1542351178.522:246696): avc: denied { dac_override } for pid=16646 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.835859] audit: type=1400 audit(1542351178.482:246695): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.837582] audit: type=1400 audit(1542351178.522:246697): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.839276] audit: type=1400 audit(1542351178.522:246698): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.841130] audit: type=1400 audit(1542351178.522:246699): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.844188] audit: type=1400 audit(1542351178.532:246700): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.846077] audit: type=1400 audit(1542351178.532:246701): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.847904] audit: type=1400 audit(1542351178.532:246702): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2841.849837] audit: type=1400 audit(1542351178.532:246703): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:01 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x80000000, 0x4) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x1}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x3) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) 06:53:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0x0, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:01 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)) 06:53:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x4000000080000}, 0xf) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:01 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) setsockopt(r0, 0x1, 0x10000, &(0x7f0000000140)="d6", 0x1) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000240)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000180)=0x20014000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fcntl$setflags(r1, 0x2, 0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffe1c, 0x3) 06:53:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000980)='/dev/rtc0\x00', 0x808007fc, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000880)={0x60, 0x0, 0x1, {{0x2, 0xffffffff7fffffff, 0x7, 0x401, 0x0, 0x9, 0x80, 0xfffffffffffffff6}}}, 0x60) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df574150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:53:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000005e00)={0x0, @rand_addr, @dev}, &(0x7f0000005e40)=0xc) connect$packet(r1, &(0x7f0000005e80)={0x11, 0x1f, r2, 0x1, 0x4}, 0x14) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000180)) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000000)) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:01 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4004700c, 0x173d) 06:53:01 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000140)) open(&(0x7f0000000180)='./file0\x00', 0x40000, 0x80) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x35) write$binfmt_elf64(r1, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x3e, 0x1, 0x298, 0x206, 0x86, 0x8, 0x4, 0x38, 0x2, 0x0, 0x7}, [], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x135bb629) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) umount2(&(0x7f0000000080)='./file0\x00', 0xa) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc004240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) dup2(r0, r1) 06:53:01 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000001c0)) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/75, 0x4b}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000340)=""/62, 0x3e}, {&(0x7f0000000500)=""/237, 0xed}, {&(0x7f0000000600)=""/229, 0xe5}], 0x7) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x0, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:05 executing program 2: r0 = gettid() r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:53:05 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000200)={0xc1c, 0x80, 0x0, 0x3ff}) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x40, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) connect$netlink(r1, &(0x7f0000000280)=@proc={0x10, 0x0, 0x25dfdbfb, 0x40000000}, 0xc) 06:53:05 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x4, 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000140)) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000300)='/dev/keychord\x00', 0x400000, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000340)="fa5a06e51607b5a501615c1096f719cb9598d480c7243af2f15a2ed301980b8d016147a1a84f564f93d57de65b6de37be827433ae9407e8fd34dc35317500d0ee2b247aad0e5867c8d66933f2a714ba13b7e8f84748599f4e9317f9d76eb63112a169b") io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r3, 0x400, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x10) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000003c0)) 06:53:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{0x9, 0x7fff, 0x3, 0x3fc0000}, 'syz1\x00', 0x1d}) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) pread64(r1, &(0x7f00000000c0)=""/49, 0x31, 0xffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x0, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x7}, 0x10) [ 2848.469636] audit_printk_skb: 872 callbacks suppressed [ 2848.469643] audit: type=1400 audit(1542351185.152:246995): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2848.530095] audit: type=1400 audit(1542351185.212:246996): avc: denied { create } for pid=16711 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:53:05 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) fsetxattr$security_ima(r1, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x6, "17733452c574e7b578f0a7"}, 0xd, 0x0) 06:53:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x4e24, @remote}}) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) 06:53:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xffb4, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x171) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040)='\v0', 0x2) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000180)=0x374) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:urandom_device_t:s0\x00', 0x26, 0x2) 06:53:05 executing program 0: io_setup(0x0, &(0x7f0000000180)=0x0) io_setup(0x104740000000000, &(0x7f0000000080)) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000040)={0x77359400}) io_destroy(r0) 06:53:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x0, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000000)={@loopback, @local, r2}, 0xc) [ 2848.530510] audit: type=1400 audit(1542351185.212:246997): avc: denied { write } for pid=16711 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2848.569771] audit: type=1400 audit(1542351185.252:246999): avc: denied { dac_override } for pid=16710 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2848.571768] audit: type=1400 audit(1542351185.222:246998): avc: denied { dac_override } for pid=16714 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2848.608586] audit: type=1400 audit(1542351185.292:247000): avc: denied { dac_override } for pid=16710 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2848.615493] audit: type=1400 audit(1542351185.292:247001): avc: denied { create } for pid=16713 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2848.632584] audit: type=1400 audit(1542351185.312:247002): avc: denied { write } for pid=16713 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2848.635056] audit: type=1400 audit(1542351185.322:247003): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2848.636777] audit: type=1400 audit(1542351185.322:247004): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:09 executing program 2: r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={0xfffffffffffffffd, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, {0x2, 0x4e24, @local}, 0x200, 0x8, 0x11, 0x401, 0x7, &(0x7f0000000080)='veth0_to_bridge\x00', 0x3f, 0x0, 0x1a}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x6}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ptrace$poke(0x5, r0, &(0x7f00000000c0), 0x7fff) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000b23000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x32, r2, 0x0) tkill(r0, 0x1000000000016) 06:53:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:09 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x40000000000, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r1, 0x3ec) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0), 0x58, 0x0, &(0x7f0000000280)="2e5986d1599fba0ef0d4d23f15b81e4c07c67ba3900e0ae10463fb1fe676c0429be079bb565e5184a89df25f5952b0aaab15021e04245ada0edc8b9ae149137f521a66a884be5a51ab3c34c4d537e2a0c2f5529830bcb3d2"}) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x30, r1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.redirect\x00') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:09 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '}#'}], 0xa, "deca0945d05cd663d2bcf389ae8ffe84126e70ab444bec866df45b038c32fd76860592c807b48daca4430d3fd93c33ef9821ad6ea366b2ee8127c292c960e82d98028461b94312a0a1f7470b2a923287c1bd7eacfd0041272fb264b2551a986710c20e02fc372fe324a568d367377d596935baba7d94030a"}, 0x88) write$binfmt_elf64(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 06:53:09 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = pkey_alloc(0x0, 0x1) pkey_free(r1) pkey_free(r1) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) fsync(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:09 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:10 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) socketpair(0x3, 0x80a, 0x10000, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x1) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x4000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x4e20, @loopback}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) [ 2853.473541] audit_printk_skb: 1143 callbacks suppressed [ 2853.473549] audit: type=1400 audit(1542351190.132:247382): avc: denied { net_admin } for pid=2083 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2853.473565] audit: type=1400 audit(1542351190.162:247387): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2853.475312] audit: type=1400 audit(1542351190.162:247388): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:10 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) mmap(&(0x7f00009da000/0x2000)=nil, 0x2000, 0x2000000, 0x40050, r1, 0x0) 06:53:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) munlockall() getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) 06:53:10 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fcntl$setflags(r2, 0x2, 0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2853.476993] audit: type=1400 audit(1542351190.162:247389): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2853.478689] audit: type=1400 audit(1542351190.162:247390): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getenv(0x4201, r1, 0x10001, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2853.480495] audit: type=1400 audit(1542351190.162:247391): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2853.482356] audit: type=1400 audit(1542351190.162:247392): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:10 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) init_module(&(0x7f0000000140)='trusted.overlay.redirect\x00', 0x19, &(0x7f0000000180)='\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2853.498372] audit: type=1400 audit(1542351190.182:247393): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2853.500300] audit: type=1400 audit(1542351190.182:247394): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x80000000, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000100)={0x1, 0x8001, 0x2, &(0x7f00000000c0)="cc61"}) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2853.502075] audit: type=1400 audit(1542351190.182:247395): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:11 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') chmod(&(0x7f00000001c0)='./file0\x00', 0x100) r3 = getpid() setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) sched_setscheduler(r3, 0x5, &(0x7f0000000180)) clock_nanosleep(0x9de93d86b6287204, 0x1, &(0x7f0000000040), &(0x7f00000000c0)) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000100), &(0x7f0000000140)='&-.selfeth1-vmnet0*\x00', 0xfffffffffffffffc) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/62, 0x3e) write$binfmt_elf64(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x766) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:53:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) 06:53:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2fc, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:11 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @broadcast}, &(0x7f0000000100)=0xc) bind$packet(r1, &(0x7f0000000140)={0x11, 0xfd, r2, 0x1, 0xe8f, 0x6, @local}, 0x14) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x64) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:14 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x2, 0x80000) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:53:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0xffffff68) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000000)={0xff, 0x6555, 0x401, 0x20, 0x1ff}) 06:53:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 06:53:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x2c0, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x168, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf0, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:14 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x400) ioctl$TIOCEXCL(r0, 0x540c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x0) r3 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r4 = openat(r3, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', &(0x7f00009b9000)="05000900667300", 0x801008, &(0x7f0000000000)) symlinkat(&(0x7f000001fff7)='./file0/file0\x00', r4, &(0x7f000001fff8)='./file0\x00') sync() renameat2(r3, &(0x7f0000000180)='./file0/file0/file0/file0\x00', r3, &(0x7f00000000c0)='./file0/file0/file0/file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f00000001c0)=""/13, &(0x7f0000000200)=0xd) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r6, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) fcntl$F_SET_RW_HINT(r5, 0x40c, &(0x7f0000000140)=0x5) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) 06:53:14 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000002340)='/selinux/enforce\x00', 0x40000, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000002380)={0x2, 0x34d, 0x5, 0x100000000, 0x10000, 0x100}) r2 = syz_open_pts(0xffffffffffffff9c, 0x100) readv(r2, &(0x7f0000002300)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/190, 0xbe}, {&(0x7f0000001180)=""/132, 0x84}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/162, 0xa2}], 0x5) 06:53:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:14 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 06:53:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x18c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:14 executing program 0: io_setup(0x5, &(0x7f0000000100)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) io_setup(0x0, &(0x7f00000000c0)) 06:53:15 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x100}, 0x28, 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffff00000000, 0x2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2858.487921] audit_printk_skb: 1668 callbacks suppressed [ 2858.487928] audit: type=1400 audit(1542351195.152:247953): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2858.489295] audit: type=1400 audit(1542351195.112:247933): avc: denied { sys_admin } for pid=2086 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2858.556119] audit: type=1400 audit(1542351195.232:247954): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:15 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) r2 = fcntl$dupfd(r1, 0x406, r1) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x1}, 0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/61, 0x3d}, {&(0x7f0000000180)=""/204, 0xcc}, {&(0x7f00000000c0)=""/14, 0xe}, {&(0x7f0000000280)=""/29, 0x1d}, {&(0x7f00000002c0)=""/12, 0xc}, {&(0x7f0000000300)=""/28, 0x1c}], 0x6) 06:53:15 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x420080) clone(0x10800000, &(0x7f00000000c0)="02d5d0700eba9d16e320d84d6a46d469d74b6151661e9992e4f3f6568946e54d97b20449a5d733908992c9496040c25fa5da06642ce5596643e1f073f270b4e3ca9772979735ed115c411e28f57d537da826ad3024d96f9e9e8d6afe6d96a70c166701207058c2", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="b9e471b33ab75f0aef83155862ab176b2d7b02595d99799773b0a963f4b7b0b002ef58d3745090710454aee1afe11dece4a1c4c799f3efcdf9b385c6d538deeb64185b4addc17ec2fe4551d672d46a3f54fd3d67074ee8cb93232452abdcbe099c9fa38fa0fdc32508f560d2ecfddebdecdcdc9a03c175e3c2df4f0e09e54d9cb4512d60c49e0949407a2f9a0bde3f2acc4b978f01833ad84bc39711ad98b176b35b0ece7b76c9e8cf41943a584307148e28e963a168") write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="68000000290100077f00004203000000020000000000000000000000fffffffff607002e2f66696c65302004000000020000000000000000010000000000006c07002e2f66696c65300002000000070000000000000001000080000000000807002e2f6600006530"], 0x68) 06:53:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) r1 = memfd_create(&(0x7f0000000000)='security\x00', 0x1) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x38, 0x0, 0x4}, 0x3}}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2858.577746] audit: type=1400 audit(1542351195.262:247955): avc: denied { sys_admin } for pid=2085 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2858.584209] audit: type=1400 audit(1542351195.272:247957): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2858.590909] audit: type=1400 audit(1542351195.262:247956): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2858.624284] audit: type=1400 audit(1542351195.312:247958): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2858.625950] audit: type=1400 audit(1542351195.312:247959): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:15 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='(\x00', 0x0) r2 = inotify_init1(0x800) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = add_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="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", 0x1000, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x3}, r3) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) [ 2858.627668] audit: type=1400 audit(1542351195.312:247960): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2858.629260] audit: type=1400 audit(1542351195.312:247961): avc: denied { net_admin } for pid=2086 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:15 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x8150, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x18c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:16 executing program 0: io_setup(0x88800000000003, &(0x7f00000000c0)=0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) close(r1) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, 0x86, "b931a2b9c04f044737ab1aefca9b3ba75b5873186cc9836fa665d338df26aeeb3b7bc410fb4cf78cf10be836c0e83447546f5dd5c4569a3993b5b7805668329be1f91373bacb9e601e9b96721baccdb2213018c37490f2a79c007837361c990d737cfa587653da6888acddbd0aaa854af8e5ae8a5c378ce168fc179689067b4dd731c9e34988"}, 0x8c) 06:53:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0xfffffe9f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80) accept4(r1, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000180)=0x80, 0x80000) write$FUSE_POLL(r1, &(0x7f00000001c0)={0x18, 0xffdffffffffffffb, 0x1, {0x10001}}, 0xffffffffffffff73) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x41fffc, 0x0) 06:53:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000180)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xffffffffffffffff, 0x9}, 0x20) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f00000001c0)=0x10008) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:16 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001180)='/dev/rtc0\x00', 0x4100, 0x0) getcwd(&(0x7f0000000180)=""/4096, 0x1000) futimesat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000001200)=0x9) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:16 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r0, 0x40a) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) sendfile(r2, r0, &(0x7f00000000c0), 0x24) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) rt_sigprocmask(0x1, &(0x7f0000000000)={0xffffffff00000000}, &(0x7f0000000040), 0x8) 06:53:18 executing program 4: r0 = dup(0xffffffffffffff9c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) fcntl$setown(r2, 0x8, r3) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r4, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:18 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)=0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) write$selinux_access(r2, &(0x7f0000000080)={'system_u:object_r:auditd_unit_file_t:s0', 0x20, 'unconfined', 0x20, 0x6}, 0x48) timer_settime(r1, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) timerfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:53:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x18c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:18 executing program 0: io_getevents(0x0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x39) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x18, 0x5, 0xe, 0x9, 0x3, 0x3, 0x3, 0xe8}) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0xf0818fb21f534b5e) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x8100, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46043f080206000000000000000000000000000100980200000000000040000000000000008600000000000000080000000400380001000000070000000000000008000000050000000000000007000000000000000000000000000000060000000000000009000000000000000900000000000000916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d120000a988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x744) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) 06:53:19 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x6) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000100)={0x4, {{0xa, 0x4e21, 0x7, @loopback, 0x2}}, 0x1, 0x2, [{{0xa, 0x4e21, 0x0, @mcast1, 0x800}}, {{0xa, 0x4e21, 0x3ff, @local, 0x5}}]}, 0x18c) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:19 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1e, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000780)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1020}, 0xffffff71, &(0x7f00000006c0)={&(0x7f00000007c0)={0xb8, r4, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1f}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x62}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8001}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r5 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x1b, &(0x7f00000001c0)='(+systemlotrustedbdevuser]\x00'}, 0x30) r7 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000005c0)={'veth0_to_bridge\x00', 0x5}) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4c24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4e22, 0x80000000, @dev={0xfe, 0x80, [], 0x1d}, 0xc7}, 0x1c) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$nl_route(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="080200001e0000042dbd7000fbdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="2000a94cd6fad89cd03a261e3d7108000d00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x208}, 0x1, 0x0, 0x0, 0x20008040}, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffedd, 0x1) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000540)={0x8, 0x4, 0x0, 0x3, 0xfffffffffffff001, 0x4, 0xea, 0xeee, 0x3, 0x9, 0x371, 0xfffffffffffffffe}) 06:53:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x3, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/225, 0xe1}, {&(0x7f0000000280)=""/187, 0xbb}, {&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000540)=""/204, 0xcc}], 0x4, &(0x7f0000000040)=""/4, 0x4, 0x9}, 0x40) 06:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x200000000000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7, 0xfffffffffffffffe}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:53:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x18c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:19 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xffffffffffffff02, 0x2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:19 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x42) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x66, 0x3, 0x0, 0x7, 0x6}, 0x14) io_setup(0xe, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x2, 0x81a, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) [ 2863.498229] audit_printk_skb: 1860 callbacks suppressed 06:53:20 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0xc, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x3c) 06:53:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2863.498237] audit: type=1400 audit(1542351200.182:248583): avc: denied { net_admin } for pid=15010 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2863.568692] audit: type=1400 audit(1542351200.252:248584): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:20 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000140)={0x81, 0x1, 0x2, 0xb520, 0x501400000000, 0x42}) [ 2863.570463] audit: type=1400 audit(1542351200.252:248585): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2863.575815] audit: type=1400 audit(1542351200.262:248586): avc: denied { dac_override } for pid=17044 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2863.578505] audit: type=1400 audit(1542351200.262:248587): avc: denied { dac_override } for pid=17067 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:20 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x29, 0x8000371, &(0x7f0000000200)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x28, &(0x7f0000000180)}, 0x10) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) getsockopt$inet_mreqsrc(r1, 0x0, 0x2d, &(0x7f0000000100)={@multicast2, @rand_addr}, &(0x7f0000000140)=0xc) 06:53:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x6, 0x0, 0x100000001, 0x8000, 0x0, 0x80, 0x4000, 0x1, 0xd1, 0x9016, 0x9f70, 0x74, 0x2, 0x40, 0x1, 0x40, 0x7, 0x0, 0x8, 0x5d882084, 0xd8, 0x0, 0x8000, 0x66, 0x0, 0x3f, 0x5, 0xc45, 0x5, 0x2, 0x2, 0x800000, 0xbf, 0x8, 0x101, 0x3f, 0x0, 0xff, 0x1, @perf_config_ext={0x796}, 0x22400, 0x81, 0x5, 0xe, 0x3, 0x0, 0x8}, 0x0, 0x6, r0, 0x2) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffc3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x10000, 0x298, 0x40, 0x86, 0x8, 0x4, 0x38, 0x1, 0x0, 0x7}, [{0x0, 0x8, 0x5, 0x7, 0x0, 0x6, 0x9, 0x9}], "916b18e5f56e1543cea30ed37cef73784bb062f2263c69ab41a3e5ceb13a755dc876362a0a41edf9a3170f208d017493809128b095e410e5170f41bf1041090d6676727963f0519df0d067bb1233a1639d019516ab173b794a7ddfbdbab111c65d6f6e5532a7f722fa913d12f0daa988f9880e4040500dfe4ed5e0a2be9b96885862a0a85dcd14305812df98f52ba74d1103e5b9f47eb9b4cc93e4b9549e84502686eaf87d0cc10a6b54a698539c1e4de6b8db02ea895675ca9256d5357ba75546f1d4e621d935753df57415", [[], [], [], [], [], []]}, 0x744) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 2863.603494] audit: type=1400 audit(1542351200.132:248573): avc: denied { net_admin } for pid=2085 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2863.605218] audit: type=1400 audit(1542351200.292:248588): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:20 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r2 = gettid() sendmsg$nl_netfilter(r1, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="f0020000030e040028bd7000fcdbdf250f00000290027800d414923e0b67646d9bf1ff55838be6e3c445990bbf977af1d28d0c08007d1ee000000108007c00", @ANYRES32=r2, @ANYBLOB="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"], 0x2f0}}, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) syz_open_procfs(r2, &(0x7f0000000200)='net/igmp6\x00') ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2863.610618] audit: type=1400 audit(1542351200.292:248589): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2863.623887] audit: type=1400 audit(1542351200.312:248590): avc: denied { create } for pid=17044 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:53:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x18c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2863.625131] audit: type=1400 audit(1542351200.312:248591): avc: denied { write } for pid=17044 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:53:21 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x40000, 0x0) socketpair(0xa, 0x0, 0x400, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000001280)={0xe1, 0x3ff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0xc) writev(r2, &(0x7f0000001240)=[{&(0x7f00000001c0)="5ee85f27fa170b584bf4f26ee0e338532d00e6528cd0b04e4da2f1439e966e72ce15376ef275248916216ef28dd2b3a0a157f2c6a273a67058040dd68f", 0x3d}, {&(0x7f0000000200)="1da38fe64b10539ed28207839cef5452ae8919768a87c21eb06aeb2712053f1f843e", 0x22}, {&(0x7f0000000240)="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", 0x1000}], 0x3) openat$ppp(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/ppp\x00', 0x200000, 0x0) 06:53:21 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) timerfd_create(0x1, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2, 0x8, 0x8}, 0xc) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000001c0)='\\-\x00') 06:53:21 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:21 executing program 5: r0 = getpgrp(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0xfe00, &(0x7f0000000940)=""/4096) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000000)=0x7, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)={0x4}) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:21 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x5811c0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000fc0)={0x0}, &(0x7f0000001000)=0xc) stat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$sndtimer(&(0x7f0000001180)='/dev/snd/timer\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000011c0)='./file0\x00', 0x540, 0x10) r6 = socket$inet6(0xa, 0x80f, 0x0) r7 = inotify_init1(0x80000) r8 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000001200)='/selinux/context\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001240)={0x0}, &(0x7f0000001280)=0xc) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001380)='memory.stat\x00', 0x0, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = accept4$inet(0xffffffffffffff9c, &(0x7f00000013c0)={0x2, 0x0, @local}, &(0x7f0000001400)=0x10, 0x800) r15 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) r16 = socket$inet_udp(0x2, 0x2, 0x0) r17 = openat$random(0xffffffffffffff9c, &(0x7f0000001440)='/dev/urandom\x00', 0x0, 0x0) fcntl$setownex(r8, 0xf, &(0x7f0000001640)={0x1, r9}) sendmmsg$unix(r0, &(0x7f0000001bc0)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000f40)=[{&(0x7f00000008c0)="eb47c6edf3ac4185ec217ce8cf38a61da7484cc2bbe418bdeaec58e07baed1c3b469546061659c9baffc9987e675dab92e93199b15fc1b15c9239a6648aad56ca55bbce0468957e96d034ef6ea11fe36a4ec8e7383e98845cb17d3d8b09557c235520121e6b8369429494cf5bba8493c51d140821cca8aa77fe0e2952715e4b21aac307b34d92d44750bf215688661ae73efc1331da02be2cd37bff4e81b63e8ab188ff7bd9102349e0ed5d019d7e3f6d64360453186553bed83e0824ab2875b1a6a9d", 0xc3}, {&(0x7f00000009c0)="f4581c3d9770abc2a2935f6aeb7568a27f207ab2e21e99ca56af09211eaee8427bcdd9c0c981495098b5e558ad4a435e771d20ae5779e5337568a8c8c2ba8339e7e0cb0c78250e30aeba8bbcff03a7b775c9a82675c8d7d4fc32d890ce62fcf6beba4a3cec8a41dbece8165cd934db205a33d83fe80a68da75bf9199b54e3e48dfeb47990b1bfc1c60304170df75ea84d3359e46d91b64db22f2cc9708b4a233cb76544068f988eee2125a59c114ae383b7b2543212c4a6f59d4286a141fc5c4799ac188cb", 0xc5}, {&(0x7f0000000ac0)="ea1419112ec307ddd0f0079874f37db05643225b4542444a6292cde5ed1071456347819071f359de9c7403f79345796150edc9cb4ef440798e104aad8a6e539134788e5667412d7e376e5756b7f5a2b65d23be9f0e6a1a3a3f8082460d67b6d7edd8242d60663f6750807616d7702354ac7546155d581fbdf41e9cde91eecd95cb1403370e663825535634f9763b811facce9a75becf04d50c31f96861424cfcf75bcc06f54ed0ad8374c45f3ac97aade5b04861ebf89fb216dcaa7dcbec12d1d5f0f14036a0652a041d3784b26b7789df4c78075dd2212b09c0571b2fa8530af8c93a195ac4", 0xe6}, {&(0x7f0000000bc0)="b663ac20e4a75ab2967caeba23794bd4eb77becb07a12529886842052a1ce0da43bd5cee138562529070d5f1744c5ec63ef4558e5f057ce7fa30b0cec92ccd8f2ea9a0be9da5c808999983b158ab9072c6be50ec4feec29da2bf0a4e6abfcb200ef02d43b28338434e25bed29b1a5bc2ad79496b207c0365d0127fd22b0a461c0cb7423af58319bf98f0b4241df8429cef8f4be6f047074b82b8a65a8fde75f8e2a17d60dba155f0e67fa0b8102b2c7d7094cb6a21fd23b20c3985eb267283f686e3db86fa0ca2ab007cebb5de904b7a5d358ee0831a1362ca09f6ac2f5716d0378b02f6b11f87397eb8b3fab9d94d0b", 0xf0}, {&(0x7f0000000cc0)="aac09b25436a08770b048a97f4b2e7cde4067c503dd159097b56ba57753bf2503761bf9342c8f355e39544d47eac2a60c933e216e4ba211d904373fbcb22ddc977ea30e69393014f4bdbf920946585ce70f33b276eb492396570fcf844e36e119a468c88db62f25b976091e70b970ae07c37be4797c60cd429132f3965e297bc09d0986e4c5c5f5481d979eb4cca45ee3de9d0d247872b57c217756dd8eaf1a552ac3be760412961a87efb95b7a0e6", 0xaf}, {&(0x7f0000000d80)="5198f5154e069b9b086d8543902cebb46cd5ce7e3de7e1e68e639ad4c64bc10cd75b4671ab47ef0661b10478cdf0433cd2fa7ad02edc52f546e1ccf0730dfe04d8c688a9e0664ecbec4c356c161cf0c446eb9c3db5c71933de2da33fc99feb2b", 0x60}, {&(0x7f0000000e00)="dee0c7460fda96c8ee1b480f300273ab0ad74f574b043ecc3a9a2d19b10ea4448b29df4e82485bb1282af64cdb05b806d5fb57bef66e771803a68f34ee730f320b9b5f226d0703e0ec80b476c4fd34f1a9cdecfdfe2bedaea7908ff541a13e1f5711ad7e11ab65d38356d5e71d5ce8cfff0812fe45f3097d233e86d08f33ebffbc3251c9ce3840294120d44d4266b8cd7838fa20eee5059b818bb042f8754480f9c4dbba540e6d5b75f1d2727f22ef3ab51f9d715b66297b7671d4df6fecb024f33c0f83fc415110131e326b3d103d2b59f07e72fa4c7ebebbba07e6c75692936b8452f94a37e3d05c3c5afe450c244941503a", 0xf3}, {&(0x7f00000000c0)="e52fd7ea77f8911937d11cdd6dd7455f5c9d370a33c1e94f92542c63cbeeb893d01dabcaa2431cd2ad7427f58d2ee8977e9b02c87bb134c4716f4d81d60ea699", 0x40}, {&(0x7f0000000f00)="2a21a86c633f36bf89f6119843794741b2504fd014b77a3b82a664ad04fcb6c8b964baf3143b054bb34843b856a028a0f7c7f0b4d5e30613adf443c3e5", 0x3d}], 0x9, &(0x7f0000001c40)=ANY=[@ANYBLOB="180000000100000002000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="200000000100000001000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="18007bab04f3610160515b4711f16c000001000000b0e8805b", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="1c0000000100000001000000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="140000000100000001000000", @ANYRES32=r16, @ANYRES32=r17], 0x80, 0x4000}, {&(0x7f0000001500)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001580)="a204478275ca646e0f0fc68089fb4d1b4fb3d0a1faf2ce85a95a1be5ee57ff7ceb86a229f0c5e7b810e19e7c2f1908955b03c9b63e43cdead110c994bc66c045dd9a0a9347f722dac3cd1179ff591a6f30f3fc768b1f97523cf430fc0f833a169e49db90c3e959c2d2e921a5e410a8d11a5f2eeb34c6cfb926628555c5", 0x7d}], 0x1, &(0x7f0000001640), 0x0, 0x10}, {&(0x7f0000001680)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001b80)=[{&(0x7f0000001700)="b00f9d5c3b3d8b661997b9be59888ea4aa12ef4a99030ad862ddf63fd5118c213e11cf3c29509d81f5ddd0fc51d2a17bed03a6f360a30529652eb098978780df623b647489f24ddd3f18b75835b9463c27163d9a93e34519158bdcf21d88ba95b8b80e4e96ee0950d670eff47ee74e1ece295303f282d435a7a9b902f5fe92ba589bc0aa6a0d0c8cad458e6b8aa9fde2df22a6702052adff25291c59595ee7894c631fc343a287cbc16d35f926f1824a0f6178b57454e5676adbe73b6ac9f32ac69225a23e7f463e71c967f00601a210a4b1d57c5d9c9c5f4eb9fa9f945a73d33d309a752339", 0xe6}, {&(0x7f0000001800)="8ae454c1c3dbf0317c97728b1d786a00c2a631828f68f1363235c8418a3d3d7b14b456ac6397530fc30d807c4508bfa7bc88d658aefacf64d66cdb010a03809fe1dd03bd02d47aeee3c0decdf1d90756613c829abcef88a4d60e3a195772877a0ca105f4d2d2bcf968a1bae293231597f55f40a1e65bdb0833297015385b2352220f24b10785a222d40e10aab22b19a89ac7a1a714cfb54337dab410", 0x9c}, {&(0x7f00000018c0)="ec7b66862fc5f372a9dc524078255dea8ee7ddd65660a798a909e2aa464cb815e7db372018acc48f837dc8a28f833bcb62c56ea94df942ede2584c14c25369fcb5e87eec82ed3ebe8f34a23569be08418b8c181ac1a8fc95df295a2f98438bf45fcaa58142bd4b39bbf6417c139f680bc232e5e71d77021fbd1b4da83c1fd9df2a46", 0x82}, {&(0x7f0000001980)="15d75f1410f503d9ba8a9757ea44a75223efb6eb61ff02b178548bfabe5ad2b2e872e42826a956fda6ef132870fb3d32a9379a4aa70a236323b69663", 0x3c}, {&(0x7f00000019c0)="313652f91d7550a8c280ef7f2823c4c1d961b983cb97c4ddf86efa3cac51b3b8c92f8a06edf77ec2732011be014962e4353d28c3b4f1113860473420f7799719734990bdb8ea2a3a5816d00ab19c13fd0db0a456ae0e51dc32c6039d02453f13909d9ccfaee6a3758e8c65cda0c3ce54a8d3417d4892cc5e9198d3113c52b9ec909b171016355b3e97", 0x89}, {&(0x7f0000001a80)="a56eea73ea15a897594fdf0d42754bb686", 0x11}, {&(0x7f0000001ac0)="c4be8bdcb7859a7b824543b11d7b24fedf2947989ddab9841e9b6b2a79f72b0cd9a0c2118135d1c2fc218744bb12810a0a30409df239b334821ff9fb60bedb4ba9f5339368c0de5d9f4dd7a245f55dee2d26bbaf15c39bcc8ff0608b9e0dc5bd010d996816e11a9540dc8db65809071d199928882c533d913200be6b93dc79712570b5c846d9174022002ea1f935280b67c3ffefdc5ad37fcc76a0b09fde4c1fe609b8", 0xa3}], 0x7, 0x0, 0x0, 0x4000000}], 0x3, 0x4000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x3ff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r18 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_elf64(r18, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x744) ioctl$LOOP_CTL_REMOVE(r18, 0x4c81, 0x0) 06:53:21 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = getpid() getpgid(r1) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r2 = dup(0xffffffffffffffff) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000100)) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000000c0)=""/4) 06:53:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000000)=""/89, 0x7}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:21 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) recvfrom$packet(r1, &(0x7f0000000140)=""/231, 0xe7, 0x2, &(0x7f0000000400)={0x11, 0x4, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x14c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:21 executing program 0: io_setup(0x80000000000006, &(0x7f00000000c0)=0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x100000000, 0x1, 0x6, 0x7, 0x0, 0x1, 0x0, 0x0, 0x3, 0x7, 0x10000, 0x1, 0x4bcf1ca6, 0x535e, 0xff, 0x6, 0x1, 0x9, 0x0, 0x1, 0x80000000, 0x8f6, 0x100000000, 0x8, 0x800, 0x3, 0x5, 0x6, 0x2, 0xb4b, 0x3, 0x1, 0xc000000000, 0x7, 0x0, 0x0, 0x0, 0x1ff, 0x7, @perf_config_ext={0xac0, 0x7fffffff}, 0xb781, 0x3e0, 0x3, 0x0, 0x80, 0x1, 0x7ff}, 0xffffffffffffff9c, 0x5, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/111) 06:53:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:22 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000140)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:22 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = syz_open_pts(0xffffffffffffff9c, 0x2080) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000140)) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x1100082) r3 = memfd_create(&(0x7f0000001380)="c8a8708e70", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000180)="16", 0x1}], 0x1, 0x1081806) write$FUSE_OPEN(r3, &(0x7f00000013c0)={0x20, 0x2, 0x6, {0x0, 0x3}}, 0x20) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000280)) ioctl$sock_netdev_private(r3, 0x89fc, &(0x7f0000000380)="1193a6d1969cec1074ec0784a39ee7440b2b8c1d6ecf63b544f256e672a627d27d5a46bd7785c73ecdf7f5b55eba5674967f278b954f31872b987549ff83f7901da724672f54af41a4218e8947d7eb0ef4ef5d4fab4b2c9a8591fe886ccd89b8066f1ea5b51ff0646eedf2aa67adabc916133dd30648ca5da61ab8e86d33d88a1fa1730cca6e69e9a003dee8aefaf26dcdfeea7ad279f399237ba45848d0253aec67b22eb85ae76b40099fe0bc87156796bb9ce032eea59eb26bc2bd1223d982eb1a04339bbea89eb9f240dc34245107bbbeda932a9c90c45d3dc7ad35dac0b88e9e47b6ec4df24322af85925025a66f8030ae34eaf647247f34344483f47277cafd2a9fc5b11d975529a3c64c9eee213d3ca66ac0fb9f78807b5f5b5e095bf563f0c0224d50eced6790142dc13e65f9137eae06512a11dfb79fb90382a8abb0f1d23829dfdc42643eff4abc2a10a50693710bce6f4b56f294170605d3620f2701c00f382e1f0a82cba9d290ee72f11abf99acf35788e12a55263188dfdd43b1c80b53a91fc458234b6db6e05b8a6c1380843d81230d2a8805d3c2215161f428da848593edf0ce87926563f9989a31ea90b1bb48c92c86c55935971ba52dc067d72c15b429e9c920d60c778ba4edb820b6484574be67acfe8338b84d3fa5f320bcfccf5dcee4236056d6b9c14d3ee8b547747e4cc5f22afc5b2984634e7a57b70310eab1508e27db053c23404fc6d89fdcffc2506648d02fc763ccfd689f03b6eb60fa3da82c90b2b6a006fb45837a64df2b89895c28b0d4ec1662bf70e391ef8dcaf9f4883b51283d15a26020e46c09df42bc8bbc3b8c036b7a04d21bdeb2b69a3942a16a5b5bcbde9b9baaa3bba61b538ede7e0892d44e74218f443615446e74055724781ec6af214bdb90433551d931f096e9f8514b83bcc1b7b564521b8abba4ec6dd6d24ecfa9945d0af83c70e81838d331de1a8b541991edd0c72152385aae567068b990f4b34bdffec851f7d77b14ff1cfdf3476f3b8ff4e4be7d77d8c12a5510e327514d01622067483213c11fa777a1d7c17d46dbfb2f02917379d51dfaa237a7ac5e6b06fb0941eb64e2ee729ff01d9ff62dd946c8f936642848c4b9e0325e0e0fe78922083f0121baa7bf74c5f425da38f1eef07d4d3cd6063b080226e176d64f6cd28371a8b2e41652121f3bfee4ebd060d05d725a2554925b370709e1813ddad3e22c0f4151710900f0f340a4039c0ad3dc463ef7fab4ffb00a0c14b12bcef4803cdf894f51839c0f57ec230ca84f8afe7d4fdb4e5d38efe642ac691976c63bb68983077de1c60959aefbc6725bb82dc5e2e6b099306c086471a927700250e99c57fdeb21db43b83c11d107a2adf94ae3e61ae4d4bedc0c02bfe2cfbd1fe0551792dcf170506f2a90f75dfeac781d0eb05720c48371c83c5bed45a53a6592a54810ab3ff4c79cc35d0a87d9426b632d72b7a09d17ae6fabccb91a88541a07681704e6bd539e231c48fe0dff55f1c6bb0d6bc1da567ea615da64bc4323c209fd9948c5a93f9a7bbfbc837c8172a769004bc8fc08d5f72d3bcd55220aed4f7312ab650c80b2a9eb2d313836ca5948ca0e099b45f90da9f175bfec50ed7e4c302dbc8a7d4d393c7d2e639036959d0d547ec86c534148bf34148b9c22e61794e3a0b23b93f13b6e42a5f9c58569f4d6b1523e210487d998c079bff3e73d67ddb714f8a47d825b3cec1324b70088a57894253711788d2f58f18727b117292b1bccbffa0531f57418f42de533af79b8b6702bd9d35393a7d4a28ab44c9c496b824b6bdd59eb7dcf7bae3825732518d7197f1ef961a19910bbe9effcb8b9dd49ab25f4212603809ce000668247ce1aa4510e4ed85393dba2111c9af50a29620f381818080fcde1419fb0bad6fa0b33e5fa8386447443f4abd10df495d97d1fb81953c76b51c30549c05b0f2a40f513278c46a1ecf12d06b616d233f1eb1969286857b1972ba485fa2e63983533b144135885221bac08ca8a1043b93765b6170c735dc1514cdefbf42cd68727abd821cb026443710faded1790009edc00cf67ea32b085356b3145d84ba2c069b3338b4104e78bf03fe2747c0f3c9d1d30cbb1b4746c1462179ac7deb2f401df14d423d17aa5ca3d49e18053ad07da6f919cc9ef7ef126b55cdad1756eddfc39af120fa524af104dc40a84ae3c8413aacf9a961b28021b75f74dc27453732501cebf5c8b43f509da3c0ad83f78ec022565168b3985a626e1b545042b123bac925208d5da2d46c86f28d3505309db0ba71b9f4698789fcc96f0b438bc48956bff1cb2c08b1c46c67e0cefdab4b86c27c945c94a2e2ff55ea5d2af80a5d9331b32ffea6e5aef23651c5906fb03a1443efdf177d4071c551e6be055486505d0ff3db4e728bf7574a8894d54b3f32168a4dc4ab5c5713e140fa87e90609603be32d613ca29b0b540ba217b643eeec9c161adbaa0b1d87131a4156e8d1cb1fa3e9f2d53c569bf08f33581b659e38713c77f9e02faecb7b51b5806d03b1dee955201a0f5fa919fa1d13048b9e3b46936e79def20ed7aec5d38a8b4cb4665c19a4fa8caaa57400faf4e3a2ded847c1b66db9ad619f7ea775802ef0f0c327ff034a6d135d5dfcf42aab080fa3449ecd8ce9df0f82e9c7458259924225aa6a2cc0242017fcd3477601896992e3789c5f3a6389123b8fafc6cb01068ec828c8cbab41fef6f975f6e9b3d7dcdb139ae5292c17429255b61faa772072b74ea3b479ab45b1a3809245dcf8aa29993aed5011972fa65d9bad3a042133cdffa4d539e744f3193e4d25ddd52b8df0001d68546766937b01def7cf3920867d8e6c6005e6d5262f6955effb4095d934d501e38172cf4b47605e36bd1dc1cca458160b24d105d9aee2a7723c6ee1cf88c68b4be52adef332f01705ce5c34f27079b7afebc000cf7515023ac2e7ed4e829e8963fc375fd386dd8965c0bb57cc4b152c7b5632f0f67baaeab3dc8651d233f39f08c852df80e1663d29ece4e33d166dcd406be5ab6cad69f0b3d42980835e6e92cde55de5015edd019644f9f63330b907bfafd1867cb3a5fe214863f61baeba4f75acb05a7b64554852299f342635f83f73dda65cd6e067b2e313b27ee3b7654473a8e5176c00336d84fbdd56e57388948e79149afdef9828c7b5fbc89d9baebea280757e076fad8ae1c8c0c471685d3b1562a20aa8469af075ed6e3b56d8431ecc10400b1905fe70d3306d05f7cfe2ea6669d1dfdf4f12aec0c2a4650c45392d613a56f78017738e03c9504032ba10af91454556c210a42cc9a0d9b040a4882ffb8ed86c16ea40cf1d4849fb078fe9775b2f0beb39c65c09eff1b14a8b14667abaa3d77f78f06bda997f47d80762a10740d7b1b80f9af0b5e633e7020641a1fc0896ff54253baf78d852a9fd1b0eab22f92a0f02ef8e098285a74ffed9d60f915f81564f301a25356cc8cde4251c9f8d6774bffab78ec1a34556443a4c25e94cce315a802be673418a28961c0125dd0fbea079094773fd16a4fafd56b088570130dda37824001b27c88e710cdf1c63c7876e2bc76cfe591371cb7ca8a15c8be8203e8ec94d3a9c510010549eae1e16e6c335bb95cccc8690c6b039172f90fad03a77f101762cdacfd8d4e3d8330bfa0e67488f4a00ce64996bd8f4de4042d778f408bbe8c1c3ffabfbf2c1502dcf00f825e263fe9b704030ca5dee233fdc81cd08ddfe57229a2482c70dc37deed33a619f8ba9a12e5ba7de16f8511760ddfdecec7bb6a4faffa206844278e972700941e7d8a7cec93a4dda4bb04fe88fa9980f1f3079d289bd176f4340ff0c49eef28af782825ccaeb04d901f32a902828bba855ba4430ec1dcbeb903a398140a9f339a8b3ecb73d95e73725a3b9196a7fb8aaf51c957a581475935baee13097798016b11254103bca0e3c703c849cab996bd97447b8a73bb246bb4d00ffa2ee998bffb5c69b65a9b4fd7f74c29f485613629a8fb85d27a5f02a0b8ca4071e8ab83589494f12fee11e459275d4ad7173d1ca9c8edcb686b9ae4946523cad7646ad8dfceba613542f6cb465896a3e182860eddd0875fd8cf489f113713753d5e322b6f836daadcd963548f5557b72dfc328009babe68339c891e9aba7674893d1717d8f2231d288c59f2c7ba75df2b98e0a9ff4d0b034bea90a095b1285bb47686920e33e2b1bb3a8d5c6f760f48b8a20a069bd3ecf01fb4d26c59e5859db3202c92ffc80177243dbecc3a22f773c3fd2e295fbc0a80801f2dd0ebf99cf90c4280592b1c4f41f750861a70b4aabadcb06a70aef981751943a60ff7b053e10b9b94b26c34e24426025fd658c01914b3bd8c7d65a311046b74c2d0677a80ade907e2323214b08c1949ba316def689fac7a6e1c96656fcc7370f0c461e20f6d18c9de7a941fabaa4238512c1bb01ded55ec2d285ae2b6a7f509ecbcdc485ee08dc364f47a112c40bba497b2ab7d3aa5e8366edf2e16037ec23ea70f521ca4943a5ebbd3667d42b3083f82d3b45849c4598e6a8fa7197de1a944cb53b186e68ae10889ef2c5e734aec03ee94ac3b900b8eb23fa3629b12c723e5dcd688df524727a6d5b11f948e8602046e4f4dc96a9613c0ff0a61c7846cc6d437de357e49860beafdc348dd46866d14c30a74a6fd9b8106db014b1f23ed6a9321fc0ea4c49a7e7ba0921f2721a641c8f4f49f17e3fde48d274e37c8d92552e8de1e905b63b228be5cbf17f0e2dd7844d23542c1b5124491036ce283dd07329b91136727de7ba923126f87a78bb1d03010d48b64ab5937d15f9c11d99b351dfe5dbde0ecc0181b3f85ed24b64c6d029158c4b329715265eff98d9d7696feba1ba6386a75beac8d94b9c674c308326dd4230137af667cac777a649c5449ab1fa3241739d7232028c366495d627ab224a01012ac482ac80d671666c0b4be4b1935a200cbc0b1cd6ac0deae26d046eea087396c2cdf9680435a27de6bdefcc2238c220909c33ef4d32bd8d8fc84e4acf81fc7ff99aa5d751eec94fd1053e09270feb559bc9d02b2120898ea342dd1de28f8ef91731eed7c3c89813b660b17415a14344ed925b4961d11202617383ffd6211b5194188cf27af57e8bc7c227062fca515be2edfbbc154c5eb2e8932c5d558b8b501c811e1ba2c1394c169081ca4f4763f0885df46b6f5cc83ccd1f31dc1387dd5b67df90074d5a7bceb9135bbb7e2c461c03e34d65b5a47212ba14d02af48744c1328d3156a26fcb04f2ce3907ca25e9984e3461c7e458af20f8448ff8ce470cf40c857c4780d56ecc02c140970bc105ded5b0a28b78c715c9177ecf47af0b1e74e7d05659904d9a00dc5294e082d47968b88d074d0deff2d8e5cad920401a660d762538797823eba80f17a668df1c473798680353f7ea7dcc15c849dcd965f9262944ca9906552acfa8546f4f5c305cf7871c6661423113aa0cff4921945c964811744bbc7571c1b81ed9ba406d29af0ea978a0edb12ad1a3099c2a8dd77c0b08a642c7a3dc830c6364eac1f30697ab5c4a68cab6035cda6b4e88bae5e6de96adf1f68dc2a431c1bbb94aa196faa179c6511e1ac29323166d4db731233fcb5faa481f4471bed5db404af7f55344bd988b43b064fbe8e396b37f7b79560acb23224e98fa05450a52603e81f7e1c8a412db02c896fe0b79343107778810b0114d51016cc5d8da785fef9070debaf9596ea52c43bb1f32dbe9f14d1ce5bbcdc5148cd3aef4c20485963c9e3a559b1a726bd99ae86") ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) read(r2, &(0x7f00000000c0)=""/5, 0x5) splice(r3, &(0x7f0000000200), r3, &(0x7f0000000240), 0x6, 0x4) sendfile(r3, r3, &(0x7f00000024c0), 0xffffffff) r4 = eventfd(0x7) renameat(r4, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000300)='./file0\x00') fcntl$setownex(r4, 0xf, &(0x7f0000000100)={0x2}) 06:53:25 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000006540)='./file0\x00', &(0x7f0000006580)=@known='system.sockprotoname\x00') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) clock_gettime(0x0, &(0x7f0000006480)={0x0, 0x0}) ioctl$RTC_AIE_OFF(r1, 0x7002) recvmmsg(r1, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/99, 0x63}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/142, 0x8e}], 0x3, &(0x7f0000001340)=""/208, 0xd0, 0xabd}, 0x100}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)=""/75, 0x4b}], 0x1, &(0x7f00000014c0)=""/54, 0x36, 0xc576}, 0x7fff}, {{&(0x7f0000001500)=@hci, 0x80, &(0x7f0000002680)=[{&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/246, 0xf6}], 0x2, &(0x7f00000026c0)=""/68, 0x44, 0x3}, 0xff}, {{&(0x7f0000002740)=@alg, 0x80, &(0x7f0000002880)=[{&(0x7f00000027c0)=""/177, 0xb1}], 0x1, &(0x7f00000028c0)=""/96, 0x60, 0xffffffffffffff00}, 0x6}, {{0x0, 0x0, &(0x7f0000004ac0)=[{&(0x7f0000002940)=""/210, 0xd2}, {&(0x7f0000002a40)=""/4096, 0x1000}, {&(0x7f0000003a40)=""/4096, 0x1000}, {&(0x7f0000004a40)=""/119, 0x77}], 0x4, &(0x7f0000004b00)=""/230, 0xe6, 0x9}, 0xffffffff}, {{&(0x7f0000004c00)=@nl, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004c80)=""/181, 0xb5}, {&(0x7f0000004d40)=""/230, 0xe6}], 0x2, &(0x7f0000004e80)=""/36, 0x24, 0x9}, 0x1}, {{&(0x7f0000004ec0)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000060c0)=[{&(0x7f0000004f40)=""/252, 0xfc}, {&(0x7f0000005040)=""/43, 0x2b}, {&(0x7f0000005080)=""/15, 0xf}, {&(0x7f00000050c0)=""/4096, 0x1000}], 0x4, &(0x7f0000006100)=""/84, 0x54, 0x6}, 0x1000}, {{&(0x7f0000006180)=@can, 0x80, &(0x7f0000006280)=[{&(0x7f0000006200)=""/37, 0x25}, {&(0x7f0000006240)=""/64, 0x40}], 0x2, &(0x7f00000062c0)=""/151, 0x97, 0xffffffff}, 0x2}], 0x8, 0x20, &(0x7f00000064c0)={r3, r4+30000000}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000006500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_adjtime(0x5, &(0x7f0000000180)={0x81, 0x8, 0x2, 0x1, 0x33, 0x4, 0x3, 0x1, 0x1, 0x80, 0x6, 0x3, 0x4, 0x9d, 0x4, 0x4, 0x4, 0x1f, 0xcb9, 0x76, 0x7f, 0xffff, 0x8, 0x0, 0x0, 0x100000001}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0xfe3b) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={"726f6965300000000000c3ffcc582000", r3}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000940)={0x40c, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xb8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r3}, {0x1ac, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r3}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3b}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xf56}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x40c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000140), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getnetconf={0x14, 0x52, 0x311}, 0x14}}, 0x0) 06:53:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x114, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0xb4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}]}}]}, 0x114}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:25 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x40100, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/97) io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r1, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:25 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x7ffff) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) socketpair$inet6(0xa, 0x800, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x1, 0x6, 0xe1b, 0xeb9, 0x3ff}, 0x20) socket$unix(0x1, 0x5, 0x0) mmap(&(0x7f0000e35000/0x1000)=nil, 0x1000, 0xfffffffffffffffd, 0x35, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 2868.638628] audit_printk_skb: 1560 callbacks suppressed [ 2868.638635] audit: type=1400 audit(1542351205.322:249112): avc: denied { sys_admin } for pid=28600 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:25 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000180)=0x5a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r3, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:25 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) r4 = getgid() getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) setgroups(0x5, &(0x7f0000000300)=[r1, r2, r3, r4, r5]) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) [ 2868.702054] audit: type=1400 audit(1542351205.382:249113): avc: denied { create } for pid=17179 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2868.702239] audit: type=1400 audit(1542351205.382:249114): avc: denied { dac_override } for pid=17176 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2868.704170] audit: type=1400 audit(1542351205.392:249115): avc: denied { write } for pid=17179 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:53:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000180)=0x6, 0x4) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000000)=0x5) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f00000000c0)={&(0x7f0000000940)=@newtclass={0xc64, 0x28, 0x800, 0x70bd27, 0x25dfdbfe, {0x0, r2, {0x1f, 0xffff}, {0x6, 0x1d}, {0xe, 0x1}}, [@TCA_RATE={0x8, 0x5, {0x709, 0x6}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0xc, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x7}]}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0xc1c, 0x2, [@TCA_HTB_CEIL64={0xc, 0x7, 0x3}, @TCA_HTB_RTAB={0x404, 0x4, [0x3, 0x4, 0x2, 0x5d, 0xffffffffffffdfd4, 0x68, 0x81, 0x100000000, 0xfffffffffffff000, 0x80, 0x5, 0x10000, 0x7fffffff, 0x9a2, 0x3, 0x2, 0x0, 0x1000, 0x6, 0xffff, 0x80, 0x4, 0x5, 0x9aff, 0x80, 0x3, 0x0, 0x1, 0x8001, 0x3, 0x8, 0xff, 0x6, 0x3, 0x1, 0x3ff, 0x9, 0x1000, 0x8, 0x5, 0x10000, 0x1, 0x24a, 0x9, 0x401, 0x3, 0x3, 0x3, 0x9, 0x81, 0x0, 0x9, 0x100000000, 0x6, 0x6, 0x9fc8, 0x9, 0x5c0, 0xd6c0, 0xbe, 0x0, 0xfffffffffffffe01, 0xfff, 0xd18a, 0x8d, 0x0, 0x401, 0x1f, 0x8, 0x3000000, 0x8, 0x80000001, 0x5, 0x1, 0x8b5, 0x6, 0x0, 0x400, 0x5, 0x7f, 0x6, 0x0, 0x3f, 0x4, 0x7, 0x80, 0x5, 0x4, 0x1, 0x400, 0x2, 0x7, 0x1, 0x9, 0x7ff, 0xffffffff, 0x100, 0x1, 0x8, 0x9, 0x7, 0x6, 0x40, 0x1, 0x3, 0x40, 0x7, 0x7, 0x4, 0x7f, 0x1, 0xfffffffffffffff7, 0x10000, 0x6, 0x8, 0x7, 0x80, 0xfffffffffffffff8, 0x6, 0x3, 0xfff, 0x7, 0x7, 0xac0, 0x3, 0x3, 0x3, 0x7fff, 0x8, 0x7, 0x4, 0x187, 0xff0000000, 0xb3, 0x8198, 0x3, 0x8, 0x100000001, 0x7, 0x2, 0x3, 0x7, 0x3, 0x6, 0x9, 0x97, 0x80000000, 0x7, 0x4, 0x8, 0x10000, 0x7, 0x1, 0x6, 0x1, 0x8, 0x8a2, 0x7fffffff, 0x4, 0x2, 0x9, 0x4, 0xadd5, 0x4, 0x5, 0x0, 0xfff, 0x101, 0xe3ca, 0x2b024145, 0x8001, 0x100000000, 0xea, 0x2, 0x5, 0x0, 0x3, 0x7, 0x3, 0x5, 0x2, 0xd453, 0x8, 0x3, 0x6, 0x3, 0x7, 0x5, 0x6, 0x7fffffff, 0x6, 0x3ff, 0x80000001, 0x9, 0x3, 0x6, 0xfffffffffffffffd, 0x7fffffff, 0xc0000, 0xd9a, 0xe9, 0xc4d, 0x620, 0x9, 0x6, 0x101, 0x9b, 0x1, 0x9, 0x8, 0x0, 0x9, 0x4, 0x2, 0x3, 0x100000001, 0x20ee, 0x3, 0x85, 0xffffffffffffff00, 0xff, 0x80, 0x3bf, 0x3, 0x7ff, 0xa248, 0xffff, 0x5, 0x1ff, 0x3, 0x800, 0x20, 0x3, 0x8, 0x164000, 0x9, 0x661, 0x7a2, 0x3, 0x80000001, 0x40000000000000, 0x7, 0x9, 0xfffffffffffffffc, 0x20, 0x6, 0x9d, 0xbc5b, 0x1, 0x2, 0x9, 0x2, 0xfff, 0x3ff, 0x80, 0x50]}, @TCA_HTB_CTAB={0x404, 0x3, [0x4, 0x9, 0x6, 0x1cb, 0x7, 0x80, 0x8, 0x1, 0x400, 0x6, 0x5b14, 0xb7, 0x6, 0x101, 0x6, 0x3, 0x5, 0x4, 0x20, 0x7, 0x200, 0xfff, 0x2, 0xd9, 0x400, 0xe5, 0x1000, 0x6, 0x81e, 0x5, 0x1, 0x2, 0x29fe, 0x6f, 0x0, 0x1, 0x1, 0x6, 0x3, 0xfff, 0x0, 0x2d674, 0xc1, 0xa5, 0x1ff, 0x1, 0xafb8, 0x0, 0xffffffffffff97f6, 0x200, 0x2, 0x4, 0x280000000000000, 0x7, 0x9, 0x1, 0x0, 0x401, 0x0, 0x4, 0x9b2, 0x1, 0x389c, 0x8, 0x6, 0x401, 0x834b, 0x101, 0x100000000, 0x2, 0x100000001, 0xdf34, 0x2, 0x8, 0x0, 0x3, 0x5, 0x0, 0x200, 0x1, 0x100000000, 0x4, 0x120000000000, 0x1, 0x7ff, 0x0, 0x80, 0x3, 0x10001, 0x3, 0x6, 0x2b58e59a, 0x9, 0x200, 0x2, 0x4, 0x8, 0xab, 0x200, 0x5, 0x0, 0x9c5, 0x81, 0x8, 0xff, 0x23, 0x10000, 0x800, 0x3, 0xfffffffffffff37d, 0x100000000, 0x7, 0x1, 0x2, 0x0, 0xfff, 0x0, 0xfffffffffffffffa, 0x101, 0x2, 0x23ee, 0x7fff, 0x7ff, 0xced9, 0x6, 0x2, 0x20000000000, 0x6, 0x2800000, 0x1000, 0xb7e, 0x0, 0x6, 0x2d, 0x3, 0x32e9, 0x5, 0x9, 0xfffffffffffffff8, 0x2, 0x5, 0x2, 0x8, 0x40, 0xe567, 0x3, 0x1, 0x8, 0x1000, 0x4, 0x80000001, 0x8000, 0x6, 0x1, 0x9, 0x4, 0xcbb5, 0x2, 0x5, 0xffff, 0x0, 0x8, 0x5, 0x7, 0x6, 0x1000, 0x2, 0x7, 0x0, 0x0, 0x1f, 0x8c2, 0x1f, 0x100000001, 0x1, 0x7, 0x7, 0x7, 0x3, 0x4, 0x0, 0x5, 0x3, 0x9, 0xb77a, 0x3, 0x100, 0x1, 0x101, 0x4, 0x3, 0x7fffffff, 0x3f, 0x1, 0xf993, 0x0, 0x0, 0xfffffffffffff5ca, 0x4, 0x3, 0x4, 0x800, 0x1, 0x1000, 0x6, 0x5, 0x441a, 0x80000001, 0xedc, 0x5, 0x1, 0xa518, 0x0, 0x8, 0x4, 0x3f, 0x7, 0x395, 0x1f, 0x8, 0x9, 0x4, 0x20, 0x5b, 0x6, 0x7f, 0x2, 0x1, 0x18000000000, 0x80000001, 0x3, 0x2, 0xbb54, 0x8, 0x9, 0x2, 0x40, 0x53, 0x2, 0x7, 0x1c00000, 0x7fff, 0x1, 0x80000001, 0x3, 0x44b4, 0x4, 0x6, 0x10000, 0x9000000000, 0x2, 0x5, 0x6, 0x9711, 0x9, 0x10000]}, @TCA_HTB_CTAB={0x404, 0x3, [0x7, 0x10001, 0x6, 0x2, 0xda, 0x0, 0x1, 0x6, 0x4, 0x101, 0x0, 0x9, 0x0, 0x2, 0x77, 0x5, 0x8, 0x5c8db689, 0x8, 0x9, 0x88, 0x0, 0x40, 0x8, 0x100000001, 0x45e, 0x3, 0x2000000, 0xffffffffffffff00, 0xff, 0x3f, 0x0, 0x59e, 0x0, 0x2, 0x4, 0x824, 0x800, 0x7, 0x3, 0x40, 0x2, 0x1, 0x7, 0x6, 0x1, 0x7, 0x6, 0x9, 0x2, 0x3, 0x0, 0xffffffffffffffe1, 0x0, 0x1, 0x401, 0xb0000000, 0xb61, 0x7ff, 0x80, 0x6, 0x7d4, 0x2, 0xa4, 0xd5a1, 0x4, 0x8, 0x3, 0xf9d, 0x3, 0xff, 0x9, 0x8, 0xfffffffffffffff7, 0x0, 0x9, 0x2b2, 0x3ff, 0x9f, 0x401, 0xcf, 0x8, 0x101, 0x3ba8f3ec, 0x6, 0x44, 0x5, 0x0, 0x5b9e2825, 0x20, 0x5, 0x7f, 0x100, 0x10001, 0x0, 0x99b, 0x80, 0x7d, 0x6, 0x1ff, 0x80000000, 0x8, 0x81a3, 0x80, 0x4, 0x0, 0x1, 0x1, 0x6, 0x7ff, 0x401, 0x7, 0x3, 0xfffffffffffffffc, 0xff, 0x8, 0x2, 0x8, 0x80000001, 0x6, 0x8, 0x200, 0x1f, 0x6, 0x10000, 0xda3, 0x8, 0x115a, 0xf44, 0x0, 0x0, 0x43, 0x8b, 0x20, 0x9, 0xfff, 0x3, 0xbb2, 0x1, 0x2, 0x1000, 0x80000001, 0xd9, 0xad, 0x3, 0x6f, 0x6fce, 0x7ff, 0x1ff, 0xffffffffffff8000, 0x0, 0x1, 0x100000001, 0x7f, 0x9, 0x2, 0x40, 0x202, 0x9, 0x100, 0x4107, 0x81, 0x5538, 0x10000, 0x4, 0xfffffffffffffff8, 0x8001, 0x175, 0x2, 0x3, 0xa69, 0x9, 0x0, 0x3ff, 0x0, 0x5, 0x3, 0x3, 0xde4, 0x281, 0x2, 0x6, 0x1, 0x100, 0x1fffffffc0000000, 0x1, 0x0, 0x1ff, 0xf9, 0x9, 0x100000000, 0x80000001, 0x1, 0xdb34, 0x800, 0x6, 0x6, 0x20, 0x9, 0x1f, 0x1000, 0xcd, 0x1, 0x9, 0x2c0, 0x3, 0x6, 0x6, 0x7, 0xb5, 0x100000001, 0x7f, 0x4, 0xfffffffffffff000, 0x3, 0x7, 0x6, 0x7, 0x7, 0x7, 0x0, 0x1, 0x8, 0x0, 0x7, 0x4000800000000, 0x18, 0x5, 0x4, 0x0, 0x1, 0x3, 0x0, 0x6a19, 0x4, 0xc28, 0x3, 0x1ff, 0x1, 0x6, 0x10001, 0xa10b, 0x7, 0x1, 0x7, 0x5, 0x6f, 0x9, 0x6bf, 0x7, 0xfc00000000000000, 0x7, 0x101, 0x2, 0x100000001, 0x9]}]}}]}, 0xc64}, 0x1, 0x0, 0x0, 0x95}, 0x20000084) 06:53:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x114, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0xb4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20995d5a}}}]}}]}, 0x114}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:25 executing program 1: write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0xffffffffffffff09}, 0x18) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000800)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast2}, 0x20) getuid() setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e60400d7ff596e1c92de0eaa311f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7000000") sendfile(r0, r0, &(0x7f00000002c0)=0x202, 0xd9) 06:53:25 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet6_buf(r1, 0x29, 0xca, &(0x7f0000000380)=""/214, &(0x7f0000000480)=0xd6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) get_robust_list(r3, &(0x7f0000000300)=&(0x7f00000002c0)={&(0x7f00000001c0)={&(0x7f0000000180)}, 0x0, &(0x7f0000000280)={&(0x7f0000000200)}}, &(0x7f0000000340)=0xc) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:25 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0xfffffede) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x4080, 0x0) prctl$getreaper(0x9, &(0x7f0000000200)) r2 = memfd_create(&(0x7f0000000340)="65746830656d31657468306d692d655f7479700fdaea55a5be27a2c481dd717d65217070703100", 0x3) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000280)=[{{}, 0x7, 0x1, 0x5}, {{r3, r4/1000+30000}, 0x0, 0x0, 0x9}, {{}, 0x0, 0x3, 0x7f}, {{r5, r6/1000+10000}, 0x4, 0x3, 0x1000}, {{0x77359400}, 0x17, 0x58dc14f1, 0x3}, {{}, 0x16, 0x3, 0x2}, {{0x77359400}, 0x7, 0x4, 0x5}, {{0x0, 0x7530}, 0x16, 0x1, 0x101}, {{0x0, 0x7530}, 0x1f, 0x6, 0x2}], 0x90) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x4, r1, &(0x7f0000000100)="3f36c1ccedbb", 0x6, 0x4, 0x0, 0x1, r2}]) 06:53:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x124) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000040)={0x80000000, 0x83b8, 0x4, 0x8, 0x1}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40046607, &(0x7f0000000100)) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x80540c4d54468ce) write$P9_RREMOVE(r2, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x64, r3, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf410}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x801}, 0x1) [ 2868.735469] audit: type=1400 audit(1542351205.422:249116): avc: denied { dac_override } for pid=17176 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:26 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xffffffffffffffae) ftruncate(r1, 0x800007) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00obt'], 0x7) r2 = open(&(0x7f0000000000)='./bus\x00', 0x4000, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/97) fsync(r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40246608, &(0x7f0000000280)={0x7, 0x3, 0x3, 0x9, 0x6, 0x7}) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000140)="7d4715a8be03585caab39399708b8745c1c44bc924bda9bd737998569f7c4ac7aa8ef4a2a0c655f39fce6c83f8f8196144a7080301753b6215090387f3b6034bb5f96ff4acd9d5d1e7d215ebec9947d6e18c", &(0x7f00000001c0)="77aa613552fa64b1fc2864f3b65b2e49431c1cd3100f2e421ca5f5bbce36977ab92aaeb1cd77b2", 0x3}, 0x20) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x20010, r5, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:26 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200100, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000003c0)={0x2f, 0x4, 0x0, {0x0, 0x10001, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000380)={0x2}) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x1, 0x400) mknod(&(0x7f0000000400)='./file0\x00', 0x800, 0x9) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x600000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xec, r2, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x19}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x18}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffff0001}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) write$P9_RREADLINK(r1, &(0x7f0000000340)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000440)) [ 2868.743306] audit: type=1400 audit(1542351205.432:249117): avc: denied { create } for pid=17180 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:53:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) pipe2$9p(&(0x7f0000000000), 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) [ 2868.743725] audit: type=1400 audit(1542351205.432:249118): avc: denied { write } for pid=17180 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2868.747369] audit: type=1400 audit(1542351205.432:249119): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2868.749019] audit: type=1400 audit(1542351205.432:249120): avc: denied { sys_admin } for pid=2084 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2868.762231] audit: type=1400 audit(1542351205.442:249121): avc: denied { sys_admin } for pid=2083 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:53:27 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x40) 06:53:27 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000140)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x114, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0xb4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x114}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x69) 06:53:27 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000000c0)={0x8, 0xe93, 0x6b6, 0x9, 0x5, 0x8, 0x1, 0x7, 0xd8d6, 0x8, 0x8000, 0x200}) 06:53:27 executing program 1: setrlimit(0x8, &(0x7f0000001240)={0x1, 0x4}) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 06:53:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) prctl$getreaper(0x5, &(0x7f0000000f80)) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f0000000340)={'syz1\x00', {0x9, 0xfffffffffffffff1}, 0x0, [0x0, 0x5, 0x9, 0x1, 0x5, 0x5, 0x800, 0x10000, 0x6, 0x4, 0xdd, 0x5, 0xfffffffffffffffa, 0x1, 0x7, 0xff, 0x9, 0x8da, 0x8, 0x1, 0xf0, 0x1c6a, 0x4, 0xfffffffffffffc01, 0x0, 0x7ff, 0x800, 0x1236, 0xdf60000000000000, 0x5, 0x2, 0x0, 0x1, 0x65d, 0x7ff, 0x1ff, 0x380000000000, 0xaba, 0x2, 0x22a, 0x7ff, 0x687a, 0xe00, 0x6, 0x0, 0x6, 0x1, 0x813, 0xd87, 0x9, 0x1, 0x4, 0x1b, 0x0, 0x80, 0x101, 0xfff, 0x9, 0x0, 0x3, 0x4, 0x9, 0x40000000, 0xda4], [0xacda, 0x8, 0x200, 0x10000, 0x2, 0x2, 0x2, 0x1f, 0x0, 0xfff, 0xb6, 0x7, 0x2, 0x0, 0x55c, 0x87, 0x1, 0x0, 0x4, 0x8c1, 0x8, 0x6, 0x1, 0x7ff, 0x7, 0xfffffffffffffff9, 0x4, 0xffffffff00000000, 0xffffffffffffff81, 0xcfe2, 0x3ff, 0x1, 0x4, 0x9, 0x4, 0x10001, 0x1f, 0x3, 0x8, 0x9, 0x7, 0x3, 0x3, 0x80000000, 0x1ff, 0x7, 0x3, 0x1, 0x40, 0x3, 0xe7, 0x8, 0x7, 0x0, 0x2b, 0x7, 0x96, 0x1, 0x400, 0x2, 0x2, 0x1, 0xb, 0x79cb6395], [0x3, 0xfff, 0xd13c, 0xdf, 0x3, 0x7ff, 0x401, 0x3, 0x8, 0x2, 0xffffffffffffffe1, 0x7, 0x7, 0x0, 0x3ff, 0x3, 0x1000, 0x1, 0x10000, 0x6, 0x5, 0x5, 0x1, 0x4, 0x10000, 0xffffffff, 0x0, 0xc8, 0x2, 0x80000001, 0x191, 0x6, 0x800, 0xffffffffffffff7f, 0x80000001, 0x9, 0x0, 0x8bcb, 0x7, 0x101, 0x6, 0x8, 0x400, 0xf6, 0x8e4, 0x1, 0x40, 0x7, 0xa42, 0x8, 0x7, 0x0, 0x0, 0x6, 0x81, 0x81, 0x80, 0x2, 0x0, 0xa0f, 0x1, 0x4, 0x7, 0x6d1c], [0x7, 0x6, 0xfffffffffffffffa, 0x7fffffff, 0x0, 0x6, 0xe411, 0x1ff, 0x2, 0x61a, 0xfffffffffffffffb, 0x4, 0x6, 0x10000, 0x100000000, 0xfffffffffffffffb, 0x6, 0x0, 0x7, 0x6, 0x2, 0x7, 0x8, 0x8, 0x8, 0x81, 0x4, 0x5, 0x7, 0x1d, 0x4deb, 0x80, 0x3, 0x4, 0x74, 0xa84, 0x7fffffff8, 0xffff, 0xfffffffffffffffe, 0x3, 0x10000, 0x400, 0x8, 0x3e19a3dc, 0x9, 0x2, 0x6bf, 0xfff, 0x1, 0x2cf9, 0x0, 0x3, 0xcca, 0x7, 0x401, 0x2, 0xffff, 0x8, 0x7, 0xa8c6, 0x400, 0x9, 0x4, 0x7]}, 0x45c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000fc0)=ANY=[@ANYBLOB="00010000150000000000040100040100c969b3f5d5e2702bac5bc615f2ddcfb06065e9ff5ef2ae5622d582729a79a97dab3935fae0dbbfeeee42dc3ae8085fb38552d87b55e32266fb7c62ff057c1ab8786f39e647426e4303cf193f958f0382eba7a07218ebc9f186e6492e3e9b4e8880e38818bb5439f64169ce43e2b50f6aa95e8f43d9a1f9806937c390dcb9f5d93c05278bdc7ea089ccf5aa504b25c5df00d72f5efabf444051af22bfc164ac71c0186d9d1c0ded07ad3a6df0d2456c92"], 0x1) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000f40)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rtc0\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) connect$inet6(r2, &(0x7f0000000f00)={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0xd}, 0xffffffffffffffff}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) getgroups(0x7, &(0x7f0000000880)=[0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0x0, 0xee00]) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000e80)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000a40, 0x0, 0x0, 0x20000a70, 0x20000c90], 0x0, &(0x7f00000002c0), &(0x7f0000000a40)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x7, 0x8, 0x88e5, 'veth1_to_bridge\x00', 'syz_tun\x00', 'dummy0\x00', 'bond0\x00', @broadcast, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x18}, [0x0, 0x0, 0x0, 0x0, 0xff], 0xe0, 0x118, 0x150, [@owner={'owner\x00', 0x18, {{r5, r5, r6, r7, 0x5, 0x7}}}, @cpu={'cpu\x00', 0x8, {{0x9, 0x1}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@random="c98ca794e9b0", 0xffffffffffffffff}}}}, {{{0x5, 0x14, 0x601, 'gre0\x00', 'tunl0\x00', 'veth0_to_bond\x00', 'tunl0\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff], @remote, [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x4, 0xe84c, 'gretap0\x00', 'bond_slave_1\x00', 'veth1_to_bond\x00', 'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @random="84bfbe50e289", [0x0, 0xff, 0x0, 0xff, 0xff], 0xa0, 0x110, 0x148, [@m802_3={'802_3\x00', 0x8, {{0xf8, 0x7, 0x2, 0x1}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0}}}]}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}]}, 0x3d4) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r8, 0x1, 0x200000010, &(0x7f0000000080)=0x1, 0x4) 06:53:27 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0xa1, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x200, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40246608, &(0x7f0000000140)={0x8000, 0x4, 0x2, 0x9, 0x7f4, 0x3ff}) pipe(&(0x7f0000000080)) 06:53:27 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:27 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000040)={@multicast1, @rand_addr}, &(0x7f0000000100)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2c00000003000000000000000000000020000000000000000b000000000000007b6370757365746264657600ebfb08703042623340274ce5830ce2254b2c087bdb372b203dcd8124e980f62a5407c8f5a9"], 0x2c) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x14c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x800000000100, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) syz_open_pts(r1, 0x206000) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) pkey_alloc(0x0, 0x3) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000000)) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000100)={0x10, 0x145, 0x4}) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f00000000c0)={0xffff, 0x9}) 06:53:28 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) r0 = timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) r1 = getpgid(0x0) rt_sigqueueinfo(r1, 0x2b, &(0x7f0000000000)={0x1f, 0xd8f, 0x6, 0x5}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="6274726673600300000000000000c0b46252"]) 06:53:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x14c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 06:53:28 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) openat$cgroup(r1, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:28 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x8000000000002ef, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100)={0x0, 0x989680}) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000480)) preadv(r2, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/180, 0xb4}, {&(0x7f0000001580)=""/154, 0x9a}], 0x3, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000140)="54b7d957621384e5d62b73703964ee7297d6e622c1a0a47d15cf1adb35717528f8484ba599757dc327e77b8b67c7cebc3a6f15365d80f5475cdf7af277a78bb6d6c25f14e4936a1fdaee877f9cb493835efc", 0x52}, {&(0x7f00000001c0)="d3be4b97e72df69eaa44e829a0629de900e858c9284c08f5560bbda6ddb97344613710f392a88935d08ee54f36fbdf31e898bc94929d5feb84c496b13b4e798b9a2593ad802090c5209c4ae79fef95fcd61d8d301fcebeb6427f1b6f0819183f79b1f97e7bd9c09c90ab4db792dd951df70b53f2346a6e7df245766ae60cb53d38b8d8", 0x83}, {&(0x7f0000000280)="3346324f95320bc9b7be6ff562794abcdbf338a233378044e5657507924b7f84dc7675c443af5580734d052b2f47fe1232f25f1a8ca1ec51012868bd76cdd3539e2bae543859c84af0ba7235dbf7808254621a3c84ede40d3355536639d77c727fb5edb1c9fb052aa42f69113ebe4ecc4d18b3c5417c7c2a93db614112d096611d6b139364ef96c6a51ccc5dce878c792b725003bf1c9b6e3006c6ce6828030a7cf48599966732b768ba6be280", 0xad}, {&(0x7f0000000340)="cb39a1185a596506dc5fba10b0f9af5d114d517a8021ddcc96a4190922d10256c7fe380011a39c8a947b7baeda822de4cfb093d0c4f17747dc614d22760e5fe773f89998482d20c8f46dcce7c1c5be0151deb592ba8310ecc4e7a9a5ec2004ea89994071b177c7a13cae8cb3aa444ba8ffd72f51ba25c56ec97c084bea1024279ce99f417130ffd3e61ce640dc09677113fa39216c7e2cbea6fcc9", 0x9b}], 0x4) 06:53:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:28 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) open(&(0x7f0000000140)='./file0\x00', 0x101000, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000200)=0x54) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:29 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/56) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/30, 0x1e}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_PIE_ON(r0, 0x7005) 06:53:29 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x22) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) 06:53:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4000000000010002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:29 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1c, 0x4, "ea3c6202c72b598a80c3128d5576d8f40bc1f6006d321a24fddd1b1c55a1aa453421facab6d5c9072847ba8fdff934d05ac01d2bb8e07442bca29d3cd391cf61", "2c271ac59f5d111b545530a99d95ded81bd753588f49a3452f3b96ae0d569623", [0x6, 0x100000000]}) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 06:53:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'sit0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@mcast2, @in=@remote}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x453c26f3eadb1fa2, &(0x7f0000000ac0)={@empty, @local}, &(0x7f0000000b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003500)={0x0, @dev, @local}, &(0x7f0000003540)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003b40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003b00)={&(0x7f0000003580)={0x14c, r1, 0x301, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0xffffffffe2b271b1, 0x3, 0x3fc7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 2872.717627] ================================================================== [ 2872.725184] BUG: KASAN: use-after-free in disk_unblock_events+0x51/0x60 [ 2872.732453] Read of size 8 at addr ffff8801af1e2fe0 by task syz-executor3/17348 [ 2872.739875] [ 2872.741486] CPU: 0 PID: 17348 Comm: syz-executor3 Not tainted 4.9.135+ #19 [ 2872.748476] ffff88016096f6e8 ffffffff81b42b89 ffffea0006bc7800 ffff8801af1e2fe0 [ 2872.756501] 0000000000000000 ffff8801af1e2fe0 0000000000000000 ffff88016096f720 [ 2872.764513] ffffffff815009ad ffff8801af1e2fe0 0000000000000008 0000000000000000 [ 2872.772549] Call Trace: [ 2872.775132] [] dump_stack+0xc1/0x128 [ 2872.780480] [] print_address_description+0x6c/0x234 [ 2872.787122] [] kasan_report.cold.6+0x242/0x2fe [ 2872.793331] [] ? disk_unblock_events+0x51/0x60 [ 2872.799542] [] __asan_report_load8_noabort+0x14/0x20 [ 2872.806282] [] disk_unblock_events+0x51/0x60 [ 2872.812316] [] __blkdev_get+0x6b6/0xd60 [ 2872.817924] [] ? __blkdev_put+0x840/0x840 [ 2872.823700] [] ? fsnotify+0x114/0x1100 [ 2872.829214] [] blkdev_get+0x2da/0x920 [ 2872.834641] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2872.841376] [] ? bd_may_claim+0xd0/0xd0 [ 2872.846989] [] ? bd_acquire+0x27/0x250 [ 2872.852504] [] ? bd_acquire+0x88/0x250 [ 2872.858024] [] ? _raw_spin_unlock+0x2c/0x50 [ 2872.863972] [] blkdev_open+0x1a5/0x250 [ 2872.869487] [] do_dentry_open+0x3ef/0xc90 [ 2872.875261] [] ? blkdev_get_by_dev+0x70/0x70 [ 2872.881295] [] vfs_open+0x11c/0x210 [ 2872.886549] [] ? may_open.isra.20+0x14f/0x2a0 [ 2872.892669] [] path_openat+0x542/0x2790 [ 2872.898574] [] ? path_mountpoint+0x6c0/0x6c0 [ 2872.904611] [] ? trace_hardirqs_on+0x10/0x10 [ 2872.910652] [] ? trace_hardirqs_on+0x10/0x10 [ 2872.916686] [] ? expand_files.part.3+0x3a9/0x6d0 [ 2872.923088] [] do_filp_open+0x197/0x270 [ 2872.928691] [] ? may_open_dev+0xe0/0xe0 [ 2872.934292] [] ? _raw_spin_unlock+0x2c/0x50 [ 2872.940242] [] ? __alloc_fd+0x1d7/0x4a0 [ 2872.945844] [] do_sys_open+0x30d/0x5c0 [ 2872.951357] [] ? filp_open+0x70/0x70 [ 2872.956699] [] ? up_read+0x1a/0x40 [ 2872.961869] [] ? compat_SyS_clock_settime+0x1a0/0x1a0 [ 2872.968687] [] compat_SyS_open+0x2a/0x40 [ 2872.974375] [] ? compat_SyS_getdents64+0x280/0x280 [ 2872.980931] [] do_fast_syscall_32+0x2f1/0xa10 [ 2872.987053] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2872.993698] [] entry_SYSENTER_compat+0x90/0xa2 [ 2872.999907] [ 2873.001525] Allocated by task 17314: [ 2873.005220] save_stack_trace+0x16/0x20 [ 2873.009174] kasan_kmalloc.part.1+0x62/0xf0 [ 2873.013480] kasan_kmalloc+0xaf/0xc0 [ 2873.017169] kmem_cache_alloc_trace+0x117/0x2e0 [ 2873.021830] alloc_disk_node+0x54/0x3a0 [ 2873.025793] alloc_disk+0x18/0x20 [ 2873.029228] loop_add+0x368/0x7a0 [ 2873.032672] loop_probe+0x14f/0x180 [ 2873.036301] kobj_lookup+0x223/0x410 [ 2873.039991] get_gendisk+0x39/0x2d0 [ 2873.043592] __blkdev_get+0x351/0xd60 [ 2873.047368] blkdev_get+0x2da/0x920 [ 2873.050969] blkdev_open+0x1a5/0x250 [ 2873.054660] do_dentry_open+0x3ef/0xc90 [ 2873.058609] vfs_open+0x11c/0x210 [ 2873.062045] path_openat+0x542/0x2790 [ 2873.065822] do_filp_open+0x197/0x270 [ 2873.069598] do_sys_open+0x30d/0x5c0 [ 2873.073287] compat_SyS_open+0x2a/0x40 [ 2873.077150] do_fast_syscall_32+0x2f1/0xa10 [ 2873.081459] entry_SYSENTER_compat+0x90/0xa2 [ 2873.085841] [ 2873.087447] Freed by task 17348: [ 2873.090792] save_stack_trace+0x16/0x20 [ 2873.094741] kasan_slab_free+0xac/0x190 [ 2873.098691] kfree+0xfb/0x310 [ 2873.101791] disk_release+0x259/0x330 [ 2873.105568] device_release+0x7e/0x220 [ 2873.109435] kobject_put+0x148/0x250 [ 2873.113129] put_disk+0x23/0x30 [ 2873.116385] __blkdev_get+0x616/0xd60 [ 2873.120161] blkdev_get+0x2da/0x920 [ 2873.123765] blkdev_open+0x1a5/0x250 [ 2873.127468] do_dentry_open+0x3ef/0xc90 [ 2873.131425] vfs_open+0x11c/0x210 [ 2873.134853] path_openat+0x542/0x2790 [ 2873.138636] do_filp_open+0x197/0x270 [ 2873.142414] do_sys_open+0x30d/0x5c0 [ 2873.146107] compat_SyS_open+0x2a/0x40 [ 2873.149971] do_fast_syscall_32+0x2f1/0xa10 [ 2873.154271] entry_SYSENTER_compat+0x90/0xa2 [ 2873.158652] [ 2873.160260] The buggy address belongs to the object at ffff8801af1e2a80 [ 2873.160260] which belongs to the cache kmalloc-2048 of size 2048 [ 2873.173153] The buggy address is located 1376 bytes inside of [ 2873.173153] 2048-byte region [ffff8801af1e2a80, ffff8801af1e3280) [ 2873.185176] The buggy address belongs to the page: [ 2873.190264] page:ffffea0006bc7800 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 2873.200470] flags: 0x4000000000004080(slab|head) [ 2873.205199] page dumped because: kasan: bad access detected [ 2873.210886] [ 2873.212505] Memory state around the buggy address: [ 2873.217413] ffff8801af1e2e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2873.224764] ffff8801af1e2f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2873.232457] >ffff8801af1e2f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2873.239791] ^ [ 2873.247398] ffff8801af1e3000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2873.254742] ffff8801af1e3080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2873.262075] ================================================================== 06:53:29 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0xee}, {0x2, 0x8}], r3}, 0x18, 0x3) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x3}) [ 2873.269411] Disabling lock debugging due to kernel taint 06:53:30 executing program 2: r0 = gettid() timer_create(0x1, &(0x7f0000044000)={0x0, 0x80000000012}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 06:53:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req={0x7, 0x3ff, 0x80000001, 0x9}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:30 executing program 0: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x101002, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x5, 0x4) io_getevents(r0, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}) 06:53:30 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) ioctl$RTC_AIE_OFF(r1, 0x7002) 06:53:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={0x9, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x32, 0x4, 0x800, 0x7, 0x400, &(0x7f0000000100)='bcsf0\x00', 0x8, 0xffffffffffffffe1, 0x55}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) getsockname$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 06:53:30 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x9}, 0x20) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f00000001c0)={0x2, 0x3, 0xb1, 0xff, 0x10000}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x7, 0x0, 0x3, 0xff, 0x4}) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x20010, r2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) [ 2873.606238] Kernel panic - not syncing: panic_on_warn set ... [ 2873.606238] [ 2873.613649] CPU: 1 PID: 17348 Comm: syz-executor3 Tainted: G B 4.9.135+ #19 [ 2873.621873] ffff88016096f648 ffffffff81b42b89 ffffffff82e371c0 00000000ffffffff [ 2873.630154] 0000000000000000 0000000000000001 0000000000000000 ffff88016096f708 [ 2873.638204] ffffffff813f6aa5 0000000041b58ab3 ffffffff82e2b1c3 ffffffff813f68e6 [ 2873.646208] Call Trace: [ 2873.648778] [] dump_stack+0xc1/0x128 [ 2873.654155] [] panic+0x1bf/0x39f [ 2873.659150] [] ? add_taint.cold.6+0x16/0x16 [ 2873.665101] [] ? ___preempt_schedule+0x16/0x18 [ 2873.671332] [] kasan_end_report+0x47/0x4f [ 2873.677112] [] kasan_report.cold.6+0x76/0x2fe [ 2873.683322] [] ? disk_unblock_events+0x51/0x60 [ 2873.689533] [] __asan_report_load8_noabort+0x14/0x20 [ 2873.696267] [] disk_unblock_events+0x51/0x60 [ 2873.702300] [] __blkdev_get+0x6b6/0xd60 [ 2873.707897] [] ? __blkdev_put+0x840/0x840 [ 2873.713668] [] ? fsnotify+0x114/0x1100 [ 2873.719181] [] blkdev_get+0x2da/0x920 [ 2873.724745] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2873.731474] [] ? bd_may_claim+0xd0/0xd0 [ 2873.737187] [] ? bd_acquire+0x27/0x250 [ 2873.742705] [] ? bd_acquire+0x88/0x250 [ 2873.748221] [] ? _raw_spin_unlock+0x2c/0x50 [ 2873.754168] [] blkdev_open+0x1a5/0x250 [ 2873.759679] [] do_dentry_open+0x3ef/0xc90 [ 2873.765451] [] ? blkdev_get_by_dev+0x70/0x70 [ 2873.771485] [] vfs_open+0x11c/0x210 [ 2873.776751] [] ? may_open.isra.20+0x14f/0x2a0 [ 2873.782870] [] path_openat+0x542/0x2790 [ 2873.788483] [] ? path_mountpoint+0x6c0/0x6c0 [ 2873.794518] [] ? trace_hardirqs_on+0x10/0x10 [ 2873.800550] [] ? trace_hardirqs_on+0x10/0x10 [ 2873.806590] [] ? expand_files.part.3+0x3a9/0x6d0 [ 2873.812973] [] do_filp_open+0x197/0x270 [ 2873.818578] [] ? may_open_dev+0xe0/0xe0 [ 2873.824213] [] ? _raw_spin_unlock+0x2c/0x50 [ 2873.830180] [] ? __alloc_fd+0x1d7/0x4a0 [ 2873.835791] [] do_sys_open+0x30d/0x5c0 [ 2873.841306] [] ? filp_open+0x70/0x70 [ 2873.846655] [] ? up_read+0x1a/0x40 [ 2873.851824] [] ? compat_SyS_clock_settime+0x1a0/0x1a0 [ 2873.858657] [] compat_SyS_open+0x2a/0x40 [ 2873.864346] [] ? compat_SyS_getdents64+0x280/0x280 [ 2873.870918] [] do_fast_syscall_32+0x2f1/0xa10 [ 2873.877043] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2873.883687] [] entry_SYSENTER_compat+0x90/0xa2 [ 2873.890458] Kernel Offset: disabled [ 2873.894071] Rebooting in 86400 seconds..