0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r13, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r15 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r15, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r13, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r13, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r16 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r16, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r16, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00,\x00\x004\x93\x00', 0xd002}) accept4(r12, 0x0, 0x0, 0x0) 01:45:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:46 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x78, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:46 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) pwritev(r3, &(0x7f0000000140)=[{&(0x7f00000005c0)="dace2c06b29e0b1324562adaea71f264a15295a81b9575ae32246f3ca6527419c26aaf81c47e7fa2b6a3fb79b90ea9c764587402a43b6b66539eb090761aaecab8feb99d3f28306d2a2e9dcb85f64315a875d2ab84a82610d739189fdfff4215142f29c7b83fcdf898f5a7296dcbb166901709cae2dc7ec3f70fb93a5a1c50f53f1da520e9e48716a48734efa87e8890d0376b9ec6299e10e60033ac768833fe34bb2478224c4760ba19902774f4cc41e2eb7045428756eee89559bca67c22f1bf572bf3", 0xc4}], 0x1, 0x0) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 904.431281] audit: type=1400 audit(1551318346.608:1011): avc: denied { create } for pid=8020 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 904.668080] audit: type=1400 audit(1551318346.848:1012): avc: denied { write } for pid=8020 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 904.797273] audit: type=1400 audit(1551318346.978:1013): avc: denied { create } for pid=8023 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f00000003c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:45:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 905.027564] audit: type=1400 audit(1551318347.208:1014): avc: denied { write } for pid=8023 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 905.204802] audit: type=1400 audit(1551318347.378:1015): avc: denied { read } for pid=8020 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 905.241999] audit: type=1400 audit(1551318347.418:1016): avc: denied { create } for pid=8020 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) pwritev(r1, &(0x7f00000028c0)=[{&(0x7f00000005c0)="d252889c3c43f8389cc2047b3c4a636e8eadcf9ff9019ed1ef18168eb9403c16fe7c57ec3c87992c2558067ccc9dc726b6203a376d3c73555a1e8855cbf737e7e22739accf4c0fbca944176d5047b2f5bc01872ee5efa1e0ffd7ba9d5dd44bcb71de3cfba3335113bd730adeaea9449622e2d0e9331481374485", 0x7a}, {&(0x7f00000003c0)="a9da16290172b4340c5979baf02a67dc7ec44c07f9", 0x15}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="539aac0284c4dbe91c58ef681c1f7948e52afbbd5bdb133fe7b7c6bddd38bb18912cefda4d8b2ea77efb94ad6d7f5563b2805de3037dea6a3175cd5f31ba30e7a15100", 0x43}, {&(0x7f00000016c0)="a49e7ca5461b9061303fa3489722c579da959438918c4ba340f56006b5640dcc592b60acba531685b749394adee78115b76cf8ad10425459dcdc770e8a34f44bb8d58a8d5b576914588630bdb8523ea53bca3e2b729129892b41057b1946a71cd9383f78ebf84d7dd65cdffeb0dd89fdadabab76cedd771dd176d733025b84279b6a43db20a362a95a7ca7a8f9ab19bd232abda1b51ab32ebd7cf90fce3e103429eb5d54e8d4bba242b3b9c61350353d7f7be1685764978a5fec0ac5cd2ce65c9f3ddfa22cc29326eb7fb9b14b0e49da5deb3de09d00c95b648c2b368bd96e564e18cb93b07d5ded820344d6d9ae7d", 0xef}, {&(0x7f0000000540)="4aa98d17728e5dddbaf3e4def4bd1ebf5903484db2ee157bc695d7db8cfd6f064ff107683c1d9d197f6390e2a37dc3", 0x2f}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000017c0)="8a6de069c8f9bb43d3", 0x9}], 0x8, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:45:47 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x6c, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x4000) write$P9_RREMOVE(r3, &(0x7f00000006c0)={0x7, 0x7b, 0x1}, 0x7) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) write$P9_RMKDIR(r5, &(0x7f0000000140)={0x14, 0x49, 0x2, {0x2, 0x1}}, 0x14) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000700)=ANY=[@ANYBLOB="66696c746572000000000004000000000000000000000000000000000000000000000000000000000000000000001d000000000000000000000000000000000000000000000000000000000000f3ff1c000000000001000500000000000000aaddc6aca26e7917262a1a8982101bd49dcb9843e71a6642dbe8802e5d1b7b8e78505a3e1326573f2997b9dfa0ee62e493debb3af2b8bb99ede460084b3829e024232907ee081763740667eb52680a401a0633d0db5d71339a53ee2fc8f45018e8c75ed3", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xc8) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 906.119795] audit: type=1400 audit(1551318348.298:1017): avc: denied { create } for pid=8077 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 906.365334] audit: type=1400 audit(1551318348.528:1018): avc: denied { write } for pid=8077 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x4b3b, &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:45:48 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x6c, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) getsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f00000005c0)=""/132, &(0x7f00000003c0)=0x84) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:45:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 907.400994] audit: type=1400 audit(1551318349.568:1019): avc: denied { create } for pid=8122 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x800000000, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x9, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) sendmsg(r5, &(0x7f0000000780)={&(0x7f00000005c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000640)="3fedeccc8ba724a9ebbda6417be8ec78bc84e69d2c65b0efb5d08eb500e80bfcadefa1361c9a7007768d3cc1acf1feaa143d44170c520a1ed1763cec2952c32c2f095b7b19aaea780b787b9a2a118f947aa7d54dac7a839fe8b7705b39ff369f313cdc9a2ec2e6f9140bab037f9fb85648ad652451fe233f180e8000f0d8715bdbed2f92a48cf48ae49c", 0x8a}, {&(0x7f00000003c0)="61a3a862ac435c8f4a569394b2c21c193f465bf0f24ea1d939179d70803acb6051441ba24ca1a6a6631da87bcf13bc339d919ce173c656d423f0ff56", 0x3c}], 0x2, &(0x7f0000000700)=[{0x50, 0x1, 0x5, "fe749948127171a73c3f05eb6d5d77418dcc16ada96c1162ec27f6e2fe7a355db99f9f4bf95a8d6aa0ef2d74e9f7e33398de006991f0fa4c2bc8320a23a4"}], 0x50}, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'ipddp0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:45:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100), 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:50 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x6c, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='.\x00', &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000540)=0x4, 0x4) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000600)=@req={0x8, 0x100, 0x4, 0xde1}, 0x10) setxattr$security_smack_transmute(&(0x7f0000000800)='./file0\x00', &(0x7f0000000640)='security.SMACK64TRANSMUTE\x00', &(0x7f00000007c0)='TRUE', 0xfffffd3c, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000000300)=""/31, 0x2f9, 0x100, &(0x7f00000003c0)={0xa, 0xfffffffffffffffe, 0x100, @remote, 0x5}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FICLONE(r2, 0x40049409, r4) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:45:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100), 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100), 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) chroot(&(0x7f00000003c0)='./file0\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) pipe(&(0x7f0000000540)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14, 0x4000000080800) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(r2, &(0x7f00000005c0)=""/76, 0x4c, 0x0, &(0x7f0000000640)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x10000c}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 01:45:51 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) connect$packet(r2, &(0x7f0000000540)={0x11, 0x1, r3, 0x1, 0x5}, 0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f00000005c0)=0xffffffff) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:51 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x70, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:51 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f00000003c0)={0xff85, 0x1, 0xffff, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:45:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000003c0)=0x20) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f00000005c0)={0x1, 0x6}) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x8000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) 01:45:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 910.022036] audit_printk_skb: 15 callbacks suppressed [ 910.056198] audit: type=1400 audit(1551318352.198:1025): avc: denied { create } for pid=8213 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 910.242842] audit: type=1400 audit(1551318352.418:1026): avc: denied { write } for pid=8213 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x70, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:52 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000005c0)=""/234) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:45:53 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x2000000040040, 0x0, 0x0) fdatasync(r0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000640)='veno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000003c0)="00622d74559d9d13cb2a360c37d838f8f755307e") r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) sendto$inet6(r2, &(0x7f00000005c0)="9b7c2e3ffb58913ceafe6a87d37566bcca319aabb981026b1e9a9930b25c7b913d587ab200d603d6ae0c236a9cd398a9fc356193f573573f5525f3243eb9c38e38d4ee11bbd74c910749d81c393766fe57740d8e35cf28532351c69979f48b", 0x5f, 0x800, &(0x7f0000000540)={0xa, 0x4e23, 0x80000001, @mcast2}, 0x1c) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) [ 911.447857] audit: type=1400 audit(1551318353.628:1027): avc: denied { create } for pid=8258 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 911.590311] audit: type=1400 audit(1551318353.768:1028): avc: denied { write } for pid=8258 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 911.910947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 01:45:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x70, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000140)={'veth1_to_bridge\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0x800}) accept4(r2, 0x0, 0x0, 0x0) 01:45:54 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 913.078594] audit: type=1400 audit(1551318355.248:1029): avc: denied { create } for pid=8307 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 913.290554] audit: type=1400 audit(1551318355.468:1030): avc: denied { write } for pid=8307 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 913.327851] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 01:45:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) 01:45:55 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x70, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x40}, 0x1c) listen(r2, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:56 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000540)={'nr0\x00', 0x6}) prctl$PR_GET_SECCOMP(0x15) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x280, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r1, &(0x7f0000000680)="bc08fe90c41033517537cf77b33f690c07d759c02196d1046e49c6460bbdde84de26e0212b1fbb637fd5ef25b05a4768bbd3eeab9e8ecc1b4530d59c57e96d221d6e3552e109ccafa92e589a52d043b86e44e7c6eeb32c8b379d811ed3ce2c1dc1a29b807da17c5339cffe56d61ea8f969e074c0fbb9e2a4016b056489a4486029c6ff97fb0bcd2461d6695eea12b04710f4d5ad813ef0a97238f489bf52588ac3efd4ea16d9528444efc2", 0xab) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:45:56 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 914.533992] audit: type=1400 audit(1551318356.698:1031): avc: denied { create } for pid=8357 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 914.668687] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. [ 914.683395] audit: type=1400 audit(1551318356.858:1032): avc: denied { create } for pid=8365 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 914.879285] audit: type=1400 audit(1551318357.058:1033): avc: denied { write } for pid=8357 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 914.929024] audit: type=1400 audit(1551318357.108:1034): avc: denied { write } for pid=8365 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:57 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000005c0)) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000540)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000640)) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 915.396207] audit: type=1400 audit(1551318357.568:1035): avc: denied { read } for pid=8365 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:57 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 916.200581] audit: type=1400 audit(1551318358.378:1036): avc: denied { create } for pid=8404 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f0000000080)={0x4, 0x2, 0x7ff, 0x400}) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0xc0b, 0x10000, 0x0, 0x7, 0x12, 0x10, "2c95e2631e10b8bd435ca647624ffca6a878e77b588c45151164c607d3b864fd5a5f3c14dc9cf5f9157153526e2ebb30400ff1769966f32287c4b9ffe33f6da2", "c302cebe01eee9f6e8276fea6f207bea1f91bf213c17dcbeb90bd8e1fd6f729b0668375c962c14957d03a9c88f6c9c69a148df05a1b8adb8f30f1323eca2f467", "8ff9080025ac406234e8b7c8fa6641f043688611987fa9787ce79fb153f1ed04", [0x4, 0x1f]}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) [ 916.365813] audit: type=1400 audit(1551318358.538:1037): avc: denied { write } for pid=8404 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:45:58 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x8000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x101, 0x0) read(r3, &(0x7f00000005c0)=""/200, 0xc8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x20, r7, 0x428, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x44010}, 0x4004) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:45:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:45:59 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0x1f, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @remote, 0xfffffffffffffffc}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:45:59 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 917.702220] audit: type=1400 audit(1551318359.878:1038): avc: denied { create } for pid=8444 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 917.938882] audit: type=1400 audit(1551318360.118:1039): avc: denied { write } for pid=8444 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 918.033480] audit: type=1400 audit(1551318360.208:1040): avc: denied { create } for pid=8458 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) pread64(r0, &(0x7f0000000680), 0x0, 0x57) mkdir(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffc) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r8, 0x105, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 918.348415] audit: type=1400 audit(1551318360.518:1041): avc: denied { write } for pid=8458 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:00 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r5, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=r6, @ANYBLOB="00082dbd8300fcdbdf250b00deff37000200080005000100000008000400df03000008000800020000001400bf00e000000100000000000000000000000008000700b28c000008000500f7ffffff1c0003000800030001000000080007004e24000008000100010000001400010008000500010000000800080008000000"], 0x84}}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000700)={@ipv4={[], [], @empty}, 0xd0, 0x2, 0xff, 0x2, 0xffffffff, 0x3}, 0x20) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 919.215072] audit: type=1400 audit(1551318361.388:1042): avc: denied { create } for pid=8497 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:01 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000006c0)={'nr0\x00', 0xa460}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='cgroup\x00') r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20028}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x2}}, ["", "", "", ""]}, 0x24}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x10, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r7, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r9, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r7, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r7, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) write$FUSE_INTERRUPT(r4, &(0x7f0000000680)={0x10, 0x0, 0x8}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 919.275591] audit: type=1400 audit(1551318361.448:1043): avc: denied { create } for pid=8498 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 919.500431] audit: type=1400 audit(1551318361.678:1044): avc: denied { write } for pid=8497 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000003c0)=@req3={0x9, 0x4, 0x0, 0x5, 0x4, 0x5, 0x5}, 0x1c) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) listen(r4, 0x3) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'caif0\x00', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:02 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) listen(r4, 0x100000000) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100), 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:03 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x4e22, 0x8848, @rand_addr, 0x9}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20000004, &(0x7f0000000540)={0xa, 0x4e22, 0x60}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000003c0)=@fragment={0x29, 0x0, 0x4, 0xc723, 0x0, 0x0, 0x64}, 0x8) accept4(r2, 0x0, 0x0, 0x0) 01:46:03 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000003c0)={0x0, 0x101, 0xffffffffffffffc1, 0x80000001, 0x6}, 0x14) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100), 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 922.297322] audit_printk_skb: 33 callbacks suppressed [ 922.369693] audit: type=1400 audit(1551318364.478:1056): avc: denied { create } for pid=8596 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 922.544282] audit: type=1400 audit(1551318364.718:1057): avc: denied { write } for pid=8596 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:05 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000140)='pstore\x00', 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000005c0)=""/154, &(0x7f00000000c0)=0x9a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:05 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r7, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x8000) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x10000, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000680)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f00000005c0)=""/138) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={r5, r6, r7}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x99}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100), 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 923.665872] audit: type=1400 audit(1551318365.838:1058): avc: denied { create } for pid=8644 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 923.870917] audit: type=1400 audit(1551318366.048:1059): avc: denied { write } for pid=8644 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r7, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x8000) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 924.866309] audit: type=1400 audit(1551318367.038:1060): avc: denied { create } for pid=8684 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 925.025351] audit: type=1400 audit(1551318367.198:1061): avc: denied { write } for pid=8684 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:07 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000540)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000780)={{{@in=@remote, @in=@local, 0x4e20, 0x7ff, 0x4e20, 0x3, 0xa, 0x20, 0x0, 0xc, r1, r2}, {0x4, 0x5, 0x8, 0x7, 0x3, 0x101, 0x4, 0x80}, {0x5, 0x1, 0xfffffffffffffff7, 0x5}, 0x7fff, 0x0, 0x0, 0x0, 0x3, 0x3}, {{@in6=@loopback, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @local}, 0x0, 0x4, 0x3, 0xc8b, 0xfffffffffffffff9, 0x4, 0x2}}, 0xe8) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r3, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r4, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r6, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r6, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r5, 0x0, 0x0, 0x0) 01:46:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f00000003c0)='tunl0\x00') recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r7, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x8000) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x101) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x4000, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U+', 0x8}, 0x28, 0x2) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$BLKROGET(r5, 0x125e, &(0x7f0000000540)) 01:46:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 926.184517] audit: type=1400 audit(1551318368.358:1062): avc: denied { create } for pid=8725 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 926.340284] audit: type=1400 audit(1551318368.518:1063): avc: denied { write } for pid=8725 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:08 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x8000) sendto$inet6(r6, 0x0, 0x0, 0x0, 0x0, 0x0) 01:46:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x5ba) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000005c0)='ren\x00\x10\x16\x17\xf3\xc3\xd5\xbbbj\xd3!Yr\xe0)\xfb\a\xe9\x19\xbfs\xe8\x93\x8c8\xb1\xef\xb7Ex \x19\x95p\xee-\x01y<\xfe\v\xc5\xe8\xfc\xb6\xc43\xffk+\x95\x89\xe1\x87\xea\x8aa\x91\xa7\'Q\xb3\xce)\xea\xc9\xbc\xbcp\xd1\x9e\xa1\x85\x120\x89\x12\xf02Th\x0e\x9f\xe5\xfb\xaf\xe0.s\xbb\x9e\x10\xeb~\x01\xa6\xa0K\xa9\xcbp\xa3\xfd\x9d\x80\x97,\xfd@\x1f\x93_\xbf\x9a\xab\xe9\xfd\xee\xffd\xff\x8f\xe2\x99e\x9f*kd\x81\r\xc2\xc3\xaei\x13\xd8U\xf4\xd9\xe7`BC', 0xffffffffffffff3f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) io_setup(0x1000000000, &(0x7f0000000680)=0x0) io_cancel(r5, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x100000000, r2, &(0x7f00000006c0)="77293c272ddd4c6a0d8c2b3a6a0e18624d4c458efd86faf7147c4232fb4be78916d5dae9c3b306678dd1aebd555317f4572cbf7e0e1a0761ae96eccab3a4f9b48547b696710f4922bf94d708e19fb156b653784c20099c9cc78aec00d227f7c7136adae417d7acab50bab432fd7a1cdfc729d55e2a5634d7889864886016dfc0ec60a453a2763f00d0ee7576c82172", 0x8f, 0xffffffffffffff3c, 0x0, 0x1, r4}, &(0x7f00000007c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000003c0), &(0x7f0000000540)=0x4) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000880)=@req3={0x10001, 0x6, 0x80000001, 0x81, 0x6, 0x2, 0x4}, 0x1c) write(r3, &(0x7f0000000800), 0xfffffffffffffe4f) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0x1f, 0x10000, &(0x7f0000000580), 0x1c) mlockall(0x3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xdf,\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x8000, 0x44) 01:46:09 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 927.464653] audit: type=1400 audit(1551318369.638:1064): avc: denied { create } for pid=8768 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) ioctl$TIOCGPTPEER(r4, 0x5441, 0x46b8) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 927.696126] audit: type=1400 audit(1551318369.868:1065): avc: denied { write } for pid=8768 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x8000) sendto$inet6(r6, 0x0, 0x0, 0x0, 0x0, 0x0) 01:46:10 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x1f, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r4, 0x0, 0x0, 0x803) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) chdir(&(0x7f00000003c0)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x2c7) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 928.828990] audit: type=1400 audit(1551318371.008:1066): avc: denied { create } for pid=8808 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 929.034940] audit: type=1400 audit(1551318371.208:1067): avc: denied { write } for pid=8808 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:11 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) sendfile(r3, r4, 0x0, 0x9) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) flistxattr(r4, &(0x7f00000005c0)=""/4096, 0x1000) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:11 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x68, r8, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5dd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59733287}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x68}}, 0x8000) sendto$inet6(r6, 0x0, 0x0, 0x0, 0x0, 0x0) 01:46:11 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 929.950603] audit: type=1400 audit(1551318372.118:1068): avc: denied { create } for pid=8845 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 01:46:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 930.082406] audit: type=1400 audit(1551318372.258:1069): avc: denied { create } for pid=8850 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 930.115364] audit: type=1400 audit(1551318372.288:1070): avc: denied { write } for pid=8850 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) socket$inet6(0xa, 0xe, 0x3) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) fcntl$getownex(r4, 0x10, &(0x7f00000003c0)={0x0, 0x0}) timer_create(0x7, &(0x7f0000000540)={0x0, 0x2b, 0x4, @tid=r5}, &(0x7f00000005c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0x1f, 0x100, &(0x7f0000001880)={0xa, 0x3, 0x0, @local}, 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) [ 930.247879] audit: type=1400 audit(1551318372.428:1071): avc: denied { read } for pid=8850 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 930.550142] audit: type=1400 audit(1551318372.728:1072): avc: denied { create } for pid=8845 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 01:46:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:12 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f00000005c0)={0x3, {{0xa, 0x4e24, 0x7, @remote, 0x7}}}, 0x88) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = dup(r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) 01:46:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000000)=""/252) 01:46:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:13 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = fcntl$dupfd(r0, 0x0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0x0) 01:46:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @empty}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x0, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:14 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) io_setup(0x7fff, &(0x7f0000000540)=0x0) pipe(&(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = eventfd2(0x6, 0x0) r5 = syz_open_dev$mice(&(0x7f0000001800)='/dev/input/mice\x00', 0x0, 0x0) r6 = open(&(0x7f0000001b40)='./file0\x00', 0x0, 0x10) io_submit(r1, 0x5, &(0x7f0000001bc0)=[&(0x7f00000016c0)={0x0, 0x0, 0x0, 0x5, 0x8, r0, &(0x7f0000000680)="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", 0x1000, 0x2, 0x0, 0x3, r2}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0xb, 0x3, r0, &(0x7f0000001700)="296bbe3b491436bc7fcf7d540e5822", 0xf, 0x6, 0x0, 0x1, r3}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x8, 0x100, r0, &(0x7f00000018c0)="2aea34e32c9fa79532ee4f744417749454492dc8bfb0820fe688eb2e5584418d2ecfd9f41248a70965faf46f2102d08f9edfe26ec6e6b9369097f8893eb54d51205e19eb79c1fe2495a06c790f4a1a441ae81b634156cbf8d08b3ae4b6a05bbffe19ec6014648da8ac5b3211679461eb2b0cb1bfee787a3adde3ab6d645badea6b2d1a288d0604b3478bd8d4a3e6cb3942ff6fac02b20f3f63b739a0d01517f6e98262aac459aedeb4de4e975ee68c0fc600f02abbead1cb32d0a3346e10bc4022566ce4", 0xc4, 0x401, 0x0, 0x1, r4}, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x8, 0x100000001, r0, &(0x7f00000019c0)="eee324d8f1f554b4d5153b098fc72f528ea90717fa4c63c182915322e8ce9fa71539af6d038cc17145c5e40ae745163283967f39a8533da9a3a7aa4ba6bb313c45872561ce52cc93df22885c9af48e32ab54eebd92bfa2b33a2580418be013f37df22ff3838e949c920428084232323d696cd8eb2398c5a62f0ceeab39247d685a52e83b63df8e326c96bb5d6e8e59dc4282009109fd70435133535c72f4ed4c2c11616d301f07955c046456c39d43c9ca7ca66dcae2a408d37685d2227e0a53f89d74fe3ce8a6c4", 0xc8, 0x7, 0x0, 0x3, r5}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000001b00)="888efe96b09d8ba5521a76562fb9e6640632508a481c206675", 0x19, 0x200, 0x0, 0x2, r6}]) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r7, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r9, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r11 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) read(r10, &(0x7f00000005c0)=""/169, 0xa9) setsockopt$packet_rx_ring(r11, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r9, &(0x7f0000000380), 0xfffffffe) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f00000003c0)={'bond_slave_0\x00', 0x200}) recvfrom$inet6(r9, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) open(&(0x7f0000000140)='./file0\x00', 0x400000, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r12, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = fcntl$dupfd(r0, 0x0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0x0) 01:46:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='fdinfo\x00') sendmsg$nl_generic(r1, &(0x7f0000000800)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x597104}, 0xc, &(0x7f00000007c0)={&(0x7f00000005c0)={0x1dc, 0x14, 0x710, 0x70bd26, 0x25dfdbfe, {0x13}, [@generic="429ed0755a499fed8c978cab8fca3195a76e895e3a62f80ca9630834461fbea501bd5632bb7f6a159118917ee2660d327bc2a4c3e703a5ad7fc55b47c5cbe764a0ed9cb132f4cf5f7a4758a3f0b64f107f32479a1d36abf868d60047b3134e90f0fcc5f4bf08db36187b217488a62e5108c3979f8ad322aa0f879a0a7b72d8f725bf8fe00933a53ac3a50a90602d9dfdce7853789ae7c974c006143d560a4143160539b989bd68b6cfbde9f229ee3cc05dc953f6c0c046518809b3149a1aa89e843e1a0ca9eeee6b3515852545", @nested={0xdc, 0x7e, [@generic="95940f6f05e4421057320ed6d8a0c6713c98adc4bfc60dc43b9b", @typed={0x8, 0x7e, @ipv4=@empty}, @typed={0x8, 0x7c, @fd=r0}, @typed={0x4, 0x38}, @generic="db4e5ad19c62f6edc73c67a88b2308e950543a344d8f42ed9cdba25ef852cdfc5d65713e53f26148fe639449e560ed39a44e440eff30f11dbdeb734a7f2418608b39cb9403d30850ea9ff9ec", @typed={0x8, 0x37, @fd=r0}, @generic="8b4421b79818a0351d43a296b259d3d79ea9cb07bd25b766b9e1e80941d87e1457a3b93f17209cdb0f01a3d3c165b2af88f1511f72b15a1e43709ad183b018da7a0cd258a2c97eaca0b1ff1cbd1766a3b367a56530"]}, @typed={0x14, 0x56, @ipv6=@mcast1}, @generic="04f1c348cd679fdd7b"]}, 0x1dc}}, 0x20040800) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) 01:46:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x0, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.events\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000640), 0x4) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fsetxattr$trusted_overlay_upper(r5, &(0x7f00000003c0)='trusted.overlay.upper\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="00fb570305ec35d14e9f56aa005cf893eaa4c65a06daf5507051ff573cd0343f9033ec73df85f686a20825b206a04aa08c65b07b169a86863e999b124792ec0fd9e61d9bf3d7de93a00a8581000000000000007c1dd7f2"], 0x57, 0x3) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x207, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='./file1\x00') mknod(&(0x7f00000014c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x841, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$P9_ROPEN(r2, 0x0, 0x5f) 01:46:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/context\x00', 0x2, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f00000005c0)={{0xa, 0x4e21, 0x7, @mcast2, 0x80000000}, {0xa, 0x4e24, 0x3f, @mcast1}, 0x6, [0x2, 0x0, 0x7, 0x7ff, 0x1f9, 0x8000, 0x80000000, 0x100000001]}, 0x5c) 01:46:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x0, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0xfffffffffffffffd}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) pread64(r0, &(0x7f0000000280)=""/44, 0x2c, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x4, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000200)={0xa, 0x20000004e22, 0x1, @empty}, 0x16c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c366440f56c9c4c27d794e0066420fe2e3f347aac442019dcc2f196f") mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r2, r3) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3102041ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$P9_RGETATTR(r1, 0x0, 0x0) 01:46:17 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) getpeername(r3, &(0x7f00000005c0)=@ax25={{0x3, @rose}, [@rose, @rose, @rose, @remote, @rose, @default, @bcast, @bcast]}, &(0x7f00000003c0)=0x80) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80004000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r5, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x10) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x20, &(0x7f0000000140)=0x3, 0x4) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e21, @empty}, {0x7, @remote}, 0x32, {0x2, 0x4e20, @multicast1}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}, 0x0, 0x0, 0x1000}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) fcntl$setlease(r1, 0x400, 0x1) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c366440f56c9c4c27d794e0066420fe2e3f347aac442019dcc2f196f") mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r2, r3) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3102041ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$P9_RGETATTR(r1, 0x0, 0x0) 01:46:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x0, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) INIT: Id "1" respawning too fast: disabled for 5 minutes [ 936.583237] audit: type=1400 audit(1551318378.758:1073): avc: denied { create } for pid=9078 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0xfffffffffffffffc}, 0x1c) listen(r2, 0x80) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e21, 0x2, @empty, 0xfff}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000540), &(0x7f00000005c0)=0x8) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) fcntl$getflags(r1, 0x401) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socket$packet(0x11, 0x3, 0x300) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0x1f, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @remote}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes 01:46:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:19 executing program 4: r0 = socket(0x13, 0x800, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x329100, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r7) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x0, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:19 executing program 0: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYBLOB='{'], 0x1) splice(r0, 0x0, r2, 0x0, 0x14005, 0x0) 01:46:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) sendmmsg(r5, &(0x7f0000001800)=[{{&(0x7f00000005c0)=@rc={0x1f, {0x100000000, 0x4, 0x8, 0x8000, 0x7, 0x1}, 0x7}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000000640)="0ec87139669adaae48b01f30b946872e0849aafa3d01353b45f2aae93aa25cc1330820eb40551f16990409a759d83de79c7378469f3d1d636aedad7dee6af9646960168c787f1887b2b585bb060c4c043ad46eff64d2824a3b93c95897f466eca05f20980ace16cd8e1502541229e169178e7cf98404f8cb4b9c371aba17a8b9d3a0c9e104aaeee343da", 0x8a}, {&(0x7f00000003c0)="759291f0cfbc778c712ebe4b728c31764baf9d", 0x13}, {&(0x7f0000000700)="df1e8a67cb5dbd7564b6fda7bacfd381581e31a5984438324b200c6c608df0a03e27f08f1f893218caac662612be80c252326eb266ab1f6c5fc72e1fff856c08411834ca17cf69e666de6b0f724ab593993885396c1aa56b94c8463fbe0efb41e53c66036d497b96c314b1d52cae3fcfc4828670520b51b411f40214efcee6c449c99caf55c0aa9822e636a51373e2a388f3228502830197d98fd9e6be52516f1e4f740bbd384557a82e5dd0235265aca3be38d85c71cce9a7fe8bde96ab1f7703dc8ee83c918fb3d6204ab8692849901e84129142366efc9ef94c01951a50697e7b43e03a46461c19be15a940a4f5fcdaadf4ea", 0xf4}, {&(0x7f0000000800)="f9533fe40e0f6d329d7e0aa4a641f6572e313d914facc78501878d448c58c5c77e4a0bebc8a5f4dbbbaaae8c84ef036195e4819c8b1ac726f6e798c14e08a5a8a13f192f57c5dd194e470da73a00d97c097e43cf060bea14a0f2aff7d028bfc03138cd0431b8227d22f25f7c3e2d7dad2d5f61f3b6ecbbb670d8a084518cba0c6ad732c1b67406f73065f8d4d9ec052b00c29317777f533c3d936032e326ea061652d73a3cea0c3b9777a985c21d9cc027149aa14830ff1bd0bebb19091fae952975b779e8deebc49e123d99e7210d90fda3ee86bae6df551ab50412c92d2f3c79ed797d0cec724934d073a4292a464016557736339e09929608bb99a74a28f3c40a84b87a13a1ba827459c57b9c01c5d1ff5f8ce948e4db3102518ceee1d5c0afc626a37def0ce71d0b56a3121a6ec71c9074ed54e03470d53fafa757cf8c3a7b4ffc2a565fbb9108fb9287a591e21801b5b4acc148949990dab93c66867266ad80c9f26de0cadff3bf7c16c32de53525e73674bf008ba4d6402404148265b0f84d6bcd5443dd5cf597c92fa4dbbed3d6163d59d375f5c84a63d3aa3a850b718ac7f1b216fdeb5c7e55c72a4ab28fd06df5bee6ad869f9fd4d0fce3f1dcc30855ef5ada5f562c41000d24bf87529b44593d278ca5961ebb882098aeecf272c1a2f1a5027588cda39fe351b36889d7c85e60231e907fcf15d228f3f8a6ad2bdd19a62f5ef585f078b1e67cc756df8f7f9cf26854dccc784e5d40ad3222ed69eb6ccf8b3d2294675cde0e9039c980718896d010de0da6389c05a21ee7e649896a6616dd76826f309dee50838fe29d16a9543964a66afa54b76bb6f07cd2e5a6dc6b419ac2bc2e7a32189a7e5f7e5ddda198eb11189e3466cc668103096f88f5648030d3fe1ab3dc474e85cca8f417e3fa957ae9f7e81c6ad3448e5917384a846013f046951fb18e4310580a0eaa140115efce97f7be01128b4e2d4d97530a73c1093afaef9fcf04c192334c3a106f89f067b6e311c71b0d9c19a192764b425f051c8bffdd01ac8d4f2081f4729af11d738436091d81c9c50a36ff1635da5290ee1b359b60099cbb668d7badb516426d53f2b447778ef5a1c0366d0086e70475b9f5536b5033c79016609bda94532f7e678e5b56452401ea8111e2215a66f9bceb760f4d1ccb80ef6d6c794647122c8a9fc0dd4c10148b02c6a6aaea2ada0a91dab3d9f2dfb90cb4d62cc47b6c19d4aa77dccbcd830ba00aac3569276d40541d8d68be8e8e08aa1c83d8bc251623dd5012f5f41e28de4e23b187fd2c247880525f4a91a44056a3ad72cfd615ffa81a628516c89c07ddb34b1e1ec99471941d7aaf95b9c005d789e0064acb4410c5393f98a83faeb9f02b74da02b63860bd761f823dd3843854a4780334e2d037510a15361c59e5d253f675d8b2f32c2ff7a563a83b75e9201b6c254360fe2a60e76a23fde4d91c48e6a83c8f368a5e9e91d94bc2424d8fa6cebb36a1ce5b2c87d98249cef71ce011e651821937f94ac687c6f12059345dcbcdf1a58965639689e33ec21a4c9a2ede9c9a95c1956071edf43e0aa446f03b42960404b4ad2371400a698a2ecd1c2dceac315a1216daf79e5983bf17476709ef1872fde8bac6a3f1eeb2ddb45d789c9c3440472226f7a40b60ac48b628d26ba0980fec12020a8d0fc28e29a799ae370f3aaa5b1828c053e8e44ef7cdc6b08b583657e663b99c2813ce72bf129aa6d15f3a3e5547874ed4b499ba9ebfc97c3dc96dcc72c25fce5f2c78a171b4fd27ca6c54be78bc918ef90981d56b282662ee0484e13a8530bd01d743f9bb5376d36ca7212df87471ad967e6a5b2b2c38dec8bb18eb6acec382c46e0e1bc9b278265e56c2dc58504260d278c93988665af6fae1bd74a0a39b2c6ce4b8a53a75566351df9592fcdb897b9870dc742ddd50e7fa387a5700233d421588306291fc588d68ca3737c53b21adaa59457f238081396d61963c48bbaef16e4bced7eb4e729dac2df102f40fcbdb2009eaaa9d53c4ab95681c24adb39b6d3eb638ea4c099474e3802c9bd692bdec3567195469dd808b8ef11bee8087dda42c6dbc8fc6d398933396f940031bcde10a6967ebff27d02935d90956c22e03ad65f891e9cc94b4e7a51c17907df9c08cf2d7adcb00bb46a167211001304893a68da224e35b81f0c26accb8cf00584fc52e96f4bda8500c37d844300233433fb5be5bb8a9f4d46ce798b9e68dc56c84fbe382e52e9e0786fc5eb3fb3ae08c3213972482df6fa4bf3fc84dd8324d5396c75b648a1c4d75ea40836d4bbad65cd9b4db80daff7211b66c30e1e0b7e737ad9be1a7627b24d44ae83437866ed994974e3584db8f4d1a9d614b54b3195680b5f8b8f611bff84483d069791f968c597261650448adc5e9edf3893202b2e643140c5a33f4428e93f9d0b77985304f83b62f2d40d1a48236faae5a3a2276019761d44286f17ca60d3ba1834c08f628bee170d2f81c44a05ca06dc66a1a5078e825a7b9c5a4daa0f4661f883d2b04a380044d9bb565d672996a7eb1a2cc6b195808e78e72f01bb121327b1ba0239f33baf578d9fd08b4cf43f7de9613828649bb91146957165669be50a9b00585594f253ae3285c2356e39b2f5169b27173f7711b2c1c18faed079507ae444d2f13b87e11989e9f5e456fc44957e7a59a442e470a703346db052cabf07f2849cc4a85aaba720af0c22b2e9dfaa83ff613debe1cf469c7febd64f5a810974308c954bcf2ac22dd709b4b344fa7d4affe0c1c7216d50bd14178768a15d1e72b048a03d6248529958b96853fe720619befb14b6c7130608873bff4240370670ff0776b32af89d01f105edccb18aae7cf744efc05f49a027abda3ba98640736d5e38fc8041355645ef1aff1e335694a9fb5d80197616c3ab4b409ceb4f225f870cd904cf3f6fc35554b01b6ef4ab5661114e027bb019b00e240e908dba06d2db8a06944b44d68f60cfb41e2eb1da6f5c6c896035310b12dbbd5272311293d97727ab3a2bb8a18a8ce40fc556ff858717bfd1c2f6c0843402f935c07967cfb229c17a7cd876efdc9cbebefd0d9989288380fd691b70aa69ef4ef1e6133b49a595b3a31f46bf12f8c8d49dd2c09b5e7d9e51c3b16a753b90886678ce9c11f8f2a41fbb9e3794ccab18bac41eb88418202c90cbb713a83bf67d0f706ba5989cf5598215d8bdf03c065e564020d0ec164bbbbc20aceebe7a741c731cf56204ee91361ef0bdb567855ff06c36a68a486579168d795760b1820b09852343e84dd0521c324e627844d909a7a86598b05aea07f32934392e455cb3fbb46c7a7c42aec38b21a0b09e59c716ef8fe8589657b0d3397d3f0e22ddaf522bcb1d6e2d7513c2e33f2cc3983575e4ce221ab99bd7ba8ee393ee6cdfbc472a71abf5cad76a17473119e9c50e961801d3d37472c4a8d5b92351f9ef18918826721e142588e2a42428dbe6826b7f1eecefa184501fc6306030ccdae2865861d4ca58737e5c110642c26142ff494b8ec58a7e4adfcae0a7677d0dc3fe72b83bcfdf767b16d9678c1aa4b9557411bf5f6ca579323355854320f4cacff1ba7d46c8764a2c8f8b51e59a8c38416c6c0980984b2627c04a6c82398126e0b7df12c8327417f3af57e756e8295f2db6c9a9142b53b2ed87426a53fa010756f5299b5ae180d3a7a7d8e7515b070aafe75416e26eb50192293c06f11bbad011710fd7f9eec2b9bb81eed6db1e316279cf5f5833f54146ca3b917419bdce40bf3649bef921301ecf0608ce37318bbca8bd9c4f7f9c7f21c764bf82c078588f1c657518561635e263f23ccb7bb14329e64533ff10f8e6362c42d763420080b23c1bb37681fa9a3213b572b39fa787dc06f69b37e2fec8da2dda6de1a81df2943449bfcd8f81bec04eb4378aa2d128f77aac656294c87e9e7388b052800faba22270e4cc293eaba75f456eaf2ad8e497da06b0dd660fad042ced1ae9df73ec4ff9abe1a79a190ec3f4c3e2335f36593cb5184c9bcdd0fd4826ac2360077378e506416ef5af812ad42e932fdf6fbd8c26d004f55591b937d1048883ff330d0737a78ea5de9afed1c207043e1a98373aab8dc6e89537fa5b096045da445fe1abbac9da70e1634d8a648ab27961c635f01ca3378b22b8a0c995a77f50e2c63a6acfe5c702f9037b50ebac33a76e464b9a094fbabf4c3f35a61e3afa49fdaeb53e72381912d3514cc3f39459c7fb26353fad85d441395b502cb4fbbf9d2d42734b7638d6a2e25254aabe9505348528e927ec6932dfd7df53653343036d1d43c62322d6933dfd9906d692b40c6b6476b8eb82248deff3a908e020077f1b9f0f6b95bf7a506f12a230681082790e212ca1e53f3f42f7706d24975993bfa489aacc341d2b37d0785b9d47786ef013af7abc3cce592800be62550a6d078428630054784c189a723c1e07f354609fea7999bf45589413883676e62509824160c054195e1b635ce9a0c7bc024ea8b82d212c7930d9618383951cc70077fbcd1cdd6bd73d5711ccc2e6044974713d8066b23ddd351aa749ede557b87cf304d84a987a012bab7a5f92b93b01ef61a029d1250be027a831877156d892838e2f25cde1b8f475eee3cf834a5a8b6eebbaf47dc46ede2fe423d526228ed1866223548804fd81684441ee5b25fe0535c9257fdee8ce86e019680a925ef67f3d02d59b6fbd65077b27ade7f461fe434b03e57a32ab4697479cb6159842017b0a85eaf06aa63f1f361978ff0077021be4d61dcb4a476ad3c3beb9909a6540ca3bcaf11f42a3bf265e5f3f4de429fd1dfc69a26623434be4ec4252d967e83bcb1c20417b79b9ed760f4f0485bb224f75aa19cd7484cff6ad560333aff8a771c4f428eacc1824a4956e471ac0893326379b2f1b1bac7c8ae7fe1d5c0722649f4c1a88f9c17f99cf4504ec995d2878e4397a73f742f2e2cfa4bcb97252e4dab3960b4fa78a6e2106b79ae182b278d49463070e30a8979417b90129266ee24bfb2421165b0be743fec99e15ab36de29addfbd22a5cab2ce50978aa7ff013a8a6ba42370c37f6d8dadfd0918227aede39bba72d15cad8685f294a4f10bff215fb21b0846c38297752e820d80735907eaa6ac29af8b2f75838f670baf4c58c6dfda674f37e97ad88e0d8df69a51f78e236c275cefc76c73c95caaa882dd1f319d32dd4df3e8be0532aee1a466a2b1ec1a18a3dbaea95fac966bd2b53e81fbf62846d6cf4dd971fe2f9c3aca714b04284444c93d63290e7b92d0e163c77f1b8eeb88209492a3338ebcc1032416a7de33406c92a07b18e44b095914ada90021839f6f09330cc56803570c2dc010066bf3bc96b5d4a407d4bb9aaa37910c75164785ab94eaf2db5d85f36b550012e5e954f6857f956e96b1ce251133d4356f991c25d22ad2c20ae0633cdf7c43050791ca758c4b05d3aa94a4797dc5a54aaf93c1c6861f48a2072a8f3f7a688398c08f497bdb2106b34b3156f6435e663155998b86cc2d1e5cf413247304f7ab4d9d978ec4e5002074a7c863a714fda75e94e44684a2a93a327b2719e8c0d7c2567ad1813fe08de1336e1b694bc9f68e5a8c3b03fd852339c69f03f5dbb5a1ec2e3d9272f8343bbced0913c969035ff98401e569791e70942e727ba22ab93f30930553457c09749a4708d686da91bd5586e01fc67f0b88b2f1f692ae388f5853a22ebb43d315091300715a2809f45230f3b00f0375719aeecf6010095030088eabccfe496dcd36c3f61e87ca10e", 0x1000}, {&(0x7f0000000540)="c1a084de4329ff89f30165b8d6a26207d929802006f5c9eda050dd332e18c25c557ec6c7e0b8", 0x26}, {&(0x7f00000018c0)="e08c5ab3108a727fd187866298d2d895aaebea6f88b81aa07a2cb34900c3761bf228545cfd174116833b33966895fb417b6e1751a9fafaa4ec821ea690880e3f4155601941e05c9d982d7d24f257a86d001bd0c7d65c8ce459c21435ae8c4a4b5f58087ddc776f1b38425baa9bec2b4f614878532b1413876f4724d5f8363a667e1a1d6e6f9ea5b7b9018d5907b605b9af6350ed561b21db246f07859476873051e0925bc3613f848dc29ef12d7275c4193390a0b4496d59e14e39ab9e456ec827f79b444ced37bf7e843584eaefe17cdebb2ea419", 0xd5}, {&(0x7f00000019c0)="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", 0x1000}, {&(0x7f00000029c0)="6d1bb3d6655ffe9d37146c0301ce59e68eff8baf76ed8564c57285eb42d42c658600e337822aa001e6f23ce8a8aa7de48b8454b041c9ff1bc04dfecfb2b8d2555d0a00982a", 0x45}, {&(0x7f0000002a40)="0c8d101a038c3a18fb154ac7d70c438981722dad59b4e005d6ac9cdad5956abadd33a7c72cc8d35c93834320330945b9a1347e2a78ed35475e0fe7077a0d26330fd90251a7be23fa55", 0x49}], 0x9, &(0x7f0000002b80)=[{0xa8, 0x111, 0x100000000, "20c0b5fade413b039fed3cb3a48fe70278da4f8e5bf6354563811c68f546423d6ecea9ec2eb004a298dfae0cc0f8adcf065a0b99f9e8b447710ec13fb31b79695b92216dd1718d7882746ef50e56cf55532ee1225e33f483a6632b0b35edd0d310e7bb19b85a06c5676ea00108fe626056b0af35baf0d101698f9eac201f6bbc93f60109137106c458287bb126d835786b8dd6a9"}, {0x18, 0x10c, 0x8, "ad7bc7"}, {0x58, 0x110, 0x4, "a4b677ca9908fe3d73bbf9884bc53139dd5207187cb166e8360a60eb80ab5db82d585465991d4051ac7e94575ba6f017548d8f71a39712c4486c0d8b8c02f8e6aee906"}, {0x78, 0x117, 0xfffffffffffffd35, "e64a4672654c3f93c06fd2a7d2847b8298a0a80960f847644d509489ceabba6cf30b290c13547dc7b7be63497487fa7e3ac5c88ea957a579dacd61b25d23595f6e9b884d5eb1a82bc2472f21d788a0207a296d3771d8ec4b61b0c9c156528fd0ede419fbad"}], 0x190}, 0x6}], 0x1, 0x4800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) sendto$inet6(r3, &(0x7f0000002d40)="251b3338e55690d4e5d8769735f7cdc252faee", 0x13, 0x90, &(0x7f0000002d80)={0xa, 0x4e21, 0x8, @mcast2, 0xf1f}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) dup2(r0, r1) INIT: Id "6" respawning too fast: disabled for 5 minutes 01:46:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:21 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="3666440f50f564ff0941c30f0f441e04a4c4c27d794e0066420fe2e33e0f1110c442019dcc6f") execve(&(0x7f0000000500)='./file1\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file1\x00', 0x1, 0x0) r0 = getpid() openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) tgkill(r0, r0, 0x2a) creat(&(0x7f0000000080)='./file0\x00', 0x0) 01:46:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_gettime(r0, &(0x7f0000000540)) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x0, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:21 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000140)={r5, 0x1, 0x6}, 0x10) INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes 01:46:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:22 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x269) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60, 0x0) 01:46:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000005, 0x20812, r0, 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) pwrite64(r2, &(0x7f00000005c0)="5eab509cc137a2874d6c5827915fe74a63684d4a5609e6d698f4e7c1b9d6d9050f222ab243963ac683c7528fb51782fca8d70a9176371c217c9e499c1d4f558c1eb934acb9b8c1481ff2cd9b43829c0e2e1bf3f66449ffa0643aa80a36a9b3150dfcf4c54e02bd41fe1e11ea2b6a1e3966989f9bd355d4e6b1114afbde9752ba409cb3b9f0407bdf9e0488c2d4dbbf8456683971ed2f0b81abfe0803fda99ec1c88add2b6f76dd05f8ac015b8f0afd5af17d0da189a9e2af4d985d846f719de0617cd01fbd580e011b", 0xc9, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) mknod(&(0x7f0000000140)='./file0\x00', 0xffc, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffffffffffe) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f00000006c0)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/loop-control\x00', 0x40000, 0x0) fchmod(r6, 0x2) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) timer_create(0x4, &(0x7f0000000540)={0x0, 0x2f, 0x2, @tid=r5}, &(0x7f00000005c0)=0x0) timer_gettime(r8, &(0x7f0000000600)) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/\x00~WMzU\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6d\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\x00\x00x\"m\a\xe6:?E\x96~\x0e\xe8Y\xbbn\x0f0x0) ptrace$setregset(0x4205, r0, 0x202, &(0x7f00000003c0)={&(0x7f00000005c0)="b581180dc60ae8b60b185a439d6290b77e43725a5f85508c79ea76bf4a84ed8094bd43f893aaa0a7be6f36c2044cd674a602841a299c027774a9d3a44f1dd36ad74fbf5887", 0x45}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:23 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000340)=""/246) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000001c0)) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xe0}) r3 = syz_open_procfs(0x0, 0x0) pwrite64(r0, &(0x7f0000000440)="41a0a4f6b803b9663f8918ed9e3e78b23b3a9b5dc1269b6b8ab7bdbbfcc02f49e5c17f859544c915876e73305d82de99be831d4179a859a1f3367337d4b846fb615bc91c9edb9e0fb52cba55a6784033c7d29fd0f933aed6f7caaac9f97683e438afbd7f6f1991af77a13bfb16e83dfa91a3d1a7b8169a3965a049", 0x7b, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCOUTQ(r3, 0x5411, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000140)=""/92) setsockopt$inet6_tcp_int(r6, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) dup(0xffffffffffffffff) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000300), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, 0x0, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r3) [ 941.681611] audit: type=1400 audit(1551318383.858:1074): avc: denied { create } for pid=9261 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 941.754837] audit: type=1400 audit(1551318383.928:1075): avc: denied { write } for pid=9261 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x402081e, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x2, 0x0) r3 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/attr/current\x00', 0x2, 0x0) write$smack_current(r3, &(0x7f0000000700)=')security[-(I\x00', 0xe) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) execveat(r6, &(0x7f0000000540)='./file0\x00', &(0x7f0000000600)=[&(0x7f00000005c0)='/dev/zero\x00'], &(0x7f0000000680)=[&(0x7f0000000640)='mime_typeeth1\x00'], 0x1500) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) [ 942.048959] audit: type=1400 audit(1551318384.228:1076): avc: denied { read } for pid=9261 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x6, 0xa, 0x20, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @rand_addr, 0x40000}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 942.158231] audit: type=1400 audit(1551318384.338:1077): avc: denied { create } for pid=9261 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) r3 = syz_open_dev$rtc(&(0x7f0000000800)='/dev/rtc#\x00', 0x5, 0x101000) ioctl$RTC_AIE_ON(r3, 0x7001) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r5, &(0x7f00000007c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000780)={&(0x7f00000005c0)=ANY=[@ANYBLOB="01010000", @ANYRES16=r8, @ANYBLOB="000b25bd7000ffdbdf250b000000e8000100100001007564703a73797a320000000008000300010000000800030000000000080003000100000044000400200001000a004e2000000006fe8000000000000000000000000000aa01010000200002000a004e2300000008fe8800000000000000000000000001014306000034000200080002007e000000080002000100008008000200ff000000080001000b000000080001001b000000080002009100000044000400200001000a004e21000000070000000000000000000000000000000000000000200002000a004e2300000004fe8000000000000000000000000000aa070000002c000900080002000000000008000100070000000800020000000000080001000700000008000100040000000c0002000800010007000000240002000800010073040000040004000400040008000200000001000800010043fd00002c00060004000200040002000800010000fffffd080001005b0b0000040002000400020008000100e1690000"], 0x184}, 0x1, 0x0, 0x0, 0x8014}, 0x800) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') exit(0x0) syz_execute_func(&(0x7f0000000180)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c40309442b813e0f1110c442019dccd3196f") write$eventfd(r0, 0x0, 0x0) 01:46:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 943.054186] audit: type=1400 audit(1551318385.228:1078): avc: denied { create } for pid=9291 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 943.122534] audit: type=1400 audit(1551318385.298:1079): avc: denied { write } for pid=9291 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 943.274140] audit: type=1400 audit(1551318385.448:1080): avc: denied { read } for pid=9291 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:25 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) timer_create(0x0, &(0x7f0000000540)={0x0, 0x35, 0x4, @thr={&(0x7f00000005c0)="8ed747e721270d6815971e44f16785dea5f093b1e2f40479b728b7764501e85ccb57f05c10c4ca170424fb802b495dfc39478afa232810bb0dacf5a5739433558cde9e81a886d737e83605205f31e418d90e2ddeba3f260bd9ab359457c404f5b794596f5dfddfd0bc6433f8ec98df65ada3c6e43a52bec483b8e65b4c9c6629986985f5959ba6dcf8b804d59b3f7284ae29026fd5f16273cceee9dd3317c9e3f3e185bd76a3845de53a1639267989f2106d437b3028ff04971d5065815d8c8183af71c1003558209e3a35115532d829464db803b80e99cc1ddb3a", &(0x7f00000006c0)="7678c570873cb1f5752d781155dd4d9e73167de701a76eb5421d04847498ea2a90f65e22a6e5eb2ca6f0eb1e81c7f5e5978bddaa44a4425e8885e293b5dc64d77b65e690a12f1fc1b430595e2e46784b1751b77dcd5ebb630431d260e0c8982c4bad76aaf043e595e619ff2d0b22578b756cea04f1151c3ab530451903517204f17e1bb70b486c9cc157f58d9d3c8ec239799821234f603328bc6d1a9dd2d5c6b4ac17dfb364"}}, &(0x7f0000000780)=0x0) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) timer_settime(r6, 0x1, &(0x7f0000000800)={{}, {r7, r8+30000000}}, &(0x7f0000000840)) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r9, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000003c0)={0x8000, 0xfffffffffffff7cc, 0x7fb, 0x800, 0x101}) accept4(r2, 0x0, 0x0, 0x0) 01:46:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x2eb, 0x0) r2 = dup3(r0, r1, 0x0) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000040)={0x77359400}, 0x10) 01:46:25 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) dup3(r1, r0, 0x80002) chdir(&(0x7f00000003c0)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f00000005c0)=@dstopts={0x7d, 0x9, [], [@pad1, @hao={0xc9, 0x10, @local}, @calipso={0x7, 0x18, {0x3, 0x4, 0x7d, 0xffffffffffffaf7a, [0x5, 0x3]}}, @ra={0x5, 0x2, 0xfffffffffffffff8}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}, @enc_lim={0x4, 0x1, 0x5}]}, 0x58) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4007d, 0x0) fcntl$notify(r5, 0x402, 0x10) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:26 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) close(r0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) 01:46:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'gretap0\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\xff\xff?\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) poll(&(0x7f0000000040)=[{r1}, {r3}], 0x2, 0x9d) dup2(r2, r3) dup3(r3, r1, 0x0) 01:46:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='ntfs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x47fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x100000000, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x2, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:27 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) socket$inet6(0xa, 0x3, 0x25) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x800000000007c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:27 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'gretap0\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\xff\xff?\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) poll(&(0x7f0000000040)=[{r1}, {r3}], 0x2, 0x9d) dup2(r2, r3) dup3(r3, r1, 0x0) 01:46:28 executing program 4: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x104) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000540)={0x5, 0x6, 0x68, &(0x7f00000005c0)="23dd7ab12bad1835c4fa45a56f975c0e25992514fe8e2aa94ea51029623705a80e56239d97350a1447a40957bf4859ab3e165fbfc44e15137f3bad267b4bb7eb77a4aaf24620ef8b2de4df652e446345f10c92e9e4d2620bb56a4813f46f1cc89f9b3a673e0c1880"}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x82) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x5, &(0x7f0000000140)=0x100000001, 0x4) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:28 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) ioctl$void(r5, 0xc0045c78) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) write$cgroup_pid(r7, &(0x7f00000003c0)=r6, 0x12) 01:46:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f00000006c0), 0x3d6043fe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000003c0)={'sit0\x00', {0x2, 0x4e24, @empty}}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) listen(r4, 0x8) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:29 executing program 0: pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="95dd64749d489e39"], 0x8) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:46:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000100)={'veth1_to_bridge\x00', {0x2, 0x4e24, @initdev}}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="030000f7fa3171feb7ae75eb36ba99287a60c5b1564f484c735833f05f6ec65e115dcf45c661ffc294014d56cc3db9c7c46f8a56ff0e32c0a3ff"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x100011, r3, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, 0x0) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r6, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) 01:46:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 948.301063] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.351461] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.408583] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.438943] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.470414] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.525795] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket 01:46:30 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x2081c, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000700)={0xa, 0x400000004e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) epoll_create(0x8) readlink(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)=""/251, 0xfb) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) ioctl$BLKIOMIN(r5, 0x1278, &(0x7f0000000540)) flock(r3, 0x8) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x800) [ 948.571139] audit: type=1400 audit(1551318390.748:1081): avc: denied { set_context_mgr } for pid=9476 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 948.604398] binder: 9476:9478 unknown command -150994941 [ 948.615131] binder: 9476:9478 ioctl c0306201 20007000 returned -22 01:46:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 948.645471] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.664152] binder: 9476:9478 ioctl c0306201 0 returned -14 [ 948.690349] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.724151] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.735323] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.750178] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.852501] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.883262] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 948.967673] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket [ 949.050190] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket 01:46:31 executing program 0: r0 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 01:46:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000006c0)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000005c0)="844c46a3e2fa87a486b59869d16ecbecf26d00536e4a6fae02a469283175b63ebbbf257d83c7197fe01d619a53a5876284789ec85f5afb8e730066ab602dc2af6a0768de869aa6782645df3689beea7ede944b4189ba493560fac0e123be1fe05ecdf9cc9a0e4b7565992346f006123db51fa82785e918eb2c1ac1136095eab95a2d79ed8ba327562a07fcb3e3e49715a3c7d494f7c839f9677ed6f6438c4d01a5c11344de86d29bbafe0f2358f37d1c6e6cf29c9fbe3ae32226ab95f9616e16bf8c5403fc6e45", 0xc7, r1}, 0x68) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000003c0)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, r5}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockname$inet6(r6, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 949.256360] binder_alloc: binder_alloc_mmap_handler: 9476 20001000-20004000 already mapped failed -16 [ 949.287427] binder: BINDER_SET_CONTEXT_MGR already set [ 949.293287] binder: 9476:9500 unknown command -150994941 [ 949.300816] binder: 9476:9481 ioctl 40046207 0 returned -16 [ 949.308408] binder: 9476:9500 ioctl c0306201 20007000 returned -22 [ 949.333413] binder: 9476:9499 ioctl c0306201 0 returned -14 01:46:31 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000540)='/dev/input/event#\x00', 0x271, 0x4102) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/net/pfkey\x00', 0x400002, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) recvfrom$inet6(r4, &(0x7f00000005c0)=""/73, 0x49, 0x2000, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}, 0x5}, 0x1c) fcntl$addseals(r0, 0x409, 0xe) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) getsockname$netlink(r4, &(0x7f0000000240), &(0x7f00000003c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000680)={'ip6erspan0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:32 executing program 0: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYRES16], 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x2, 0x4}, 0x10) close(r1) 01:46:32 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r2) getsockname$packet(r4, &(0x7f0000000540), &(0x7f00000005c0)=0x14) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) syz_open_procfs(r6, &(0x7f00000003c0)='gid_map\x00') ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xc000000000, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000003c0)={0x29, 0x0, 0x0, 0x0, "0000e1d1ea0000000000000000afa68a69da0000000000000000000800"}) 01:46:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000003c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x0) fchmod(r2, 0x40) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, "ee9c21793b3d834fb795566840725066c8162fc33ad564be8e342ed7f35c6fee491b8305f233247f1ce69ea9389e7046270acf591224959c51e95711a9cab013", "469ee71d809f67ac4b726034729c558a90365ca165ee65de3617bd6fa934cdb1", [0xfffffffffffffe00, 0x8]}) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:33 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x5) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x800, 0x4) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x30, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:33 executing program 0: 01:46:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:33 executing program 0: 01:46:34 executing program 0: 01:46:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000005c0)={'nat\x00'}, &(0x7f00000003c0)=0x78) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:34 executing program 0: 01:46:34 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000005c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad3416da4658d2b21fa3e674d4f589654a9e9ab62b6c16baae40c0e6a1c450668d93e1c7367a497428f7f14b8c5a572940443d2cc11dab3aec0d7d2bc75ac117a0b28f1bd6e76f75ab574d0abf85f5071bb57665e799f2d71a72ad0d42e244040448197c8e0a4861214e1147c7510315e536e6110bd5545f277ced6cc65ae83af8f0a5962aa487188bdf8d64069c594c4f269636ea6c1ed9f241a140c34c057c070079a5c48d4ed69669fc568bb60000", 0xfffffffffffffd5c, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:35 executing program 0: 01:46:35 executing program 0: 01:46:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x2a0, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) fcntl$getownex(r0, 0x10, &(0x7f0000000540)={0x0, 0x0}) sched_getscheduler(r3) fstat(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x5, &(0x7f00000003c0)='./file0\x00', r4, &(0x7f0000000640)="e28d585881cf2d16757fad59504610c52e478021831633c07178615d4a27f4dbcb84f6772068d3b00e199b089cc33e8c51ddd210250b30f8ea18acc6ed00bfd4e5de7bc07d99b1b2b4b62bbce6f24e7e9e6ed86b46220b02e37d8444a9822e7e72332d79de398222ea1d08a1ea66ebf99116432ef940") setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:35 executing program 0: 01:46:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:35 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) shutdown(r2, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x2080}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) write$apparmor_exec(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="e578206c6703000024000000000000090000110000"], 0x15) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr, 0x401}, 0xffffff80) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:36 executing program 0: 01:46:36 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x80001, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) ioctl$BLKDISCARD(r4, 0x1277, &(0x7f0000000140)=0x184) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:36 executing program 0: 01:46:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:36 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) write$cgroup_pid(r4, &(0x7f0000000600)=r6, 0x12) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r8, 0x6, 0x23, &(0x7f0000000540)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000005c0)=0x10) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) getsockopt$bt_hci(r5, 0x0, 0x3, &(0x7f0000000640)=""/206, &(0x7f0000000740)=0xce) 01:46:36 executing program 0: 01:46:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000540)=0xc) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r8 = accept4(r2, 0x0, 0x0, 0x0) r9 = open$dir(&(0x7f00000005c0)='./file0\x00', 0x2000, 0x112) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000600)={0x1, 0xd7b3, 0x9, 0x0, 0x0, [{r8, 0x0, 0x57}, {r1, 0x0, 0x9}, {r9, 0x0, 0x2}, {r1, 0x0, 0x6}, {r5, 0x0, 0x4c9}, {r8, 0x0, 0x10000}, {r6, 0x0, 0x77}, {r2, 0x0, 0x101}, {r6, 0x0, 0x4}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x0, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:37 executing program 0: 01:46:37 executing program 0: 01:46:37 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000005c0)=0x91f71879f8547ebb) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000880)='/dev/net/tun\x00', 0xc680, 0x0) 01:46:38 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x10200, 0x0) setsockopt$inet_buf(r2, 0x0, 0x28, &(0x7f00000003c0)="ba8d6a6f4b541324ac81d2994f6b", 0xe) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x109201, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r6, 0xad1, &(0x7f0000000600)=""/213) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) 01:46:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/udp\x00') read(r1, 0x0, 0x0) 01:46:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x0, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000003c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:38 executing program 0: add_key(&(0x7f0000000180)='big_key\x00', 0x0, &(0x7f0000000680)="c6", 0x1, 0xffffffffffffffff) 01:46:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:39 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x20, 0x4, 0xfff}) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22, 0x3f, @rand_addr="11d58c5ddf272637c194eb0fdebd52d9", 0x1}, 0xa6) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f0000000100)={0x7, 0x4, 0x1000000}) 01:46:39 executing program 0: r0 = epoll_create1(0x0) poll(&(0x7f0000000100)=[{r0, 0xfffffffffffffffd}], 0x1, 0xffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_pwait(r0, &(0x7f00000001c0)=[{}], 0x1, 0x4e52, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000180)={0x80000005}) 01:46:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x0, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:40 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = accept4(r2, 0x0, &(0x7f0000000540), 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000b00)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000c00)=0xe8) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000c40)={r4, 0x1, 0x6, @random="335b28594fb2"}, 0x10) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xffffffffffffff9a) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) setsockopt$inet_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x4) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)='pstore\x00F\xec\xc4\x97s\xb0J{bF\n\x98\xe4\x92;T\xea\x9ev\xee\xa2\xbb.\x04|\b\nUr^R(\xa6x)e\xe2\xf6R\xe1i\x1b\x16\xff\xb2\xbd_ml\xc07@\xcf+k\xe1}\fD(\x04\x16\x15\x8e_\xbcE_\xb2K\xa8\xa6Yu\xd4\x9c\xe8\xc1\x8a\x14\xea\x9b\xdfYd\xabl\x8e\xf9e[\x84\x00+\x19\x03\x8b\x1aR\x8b\\\xf2\xbcu\x90\xabD\x8b\x83\xbc\x9d6X\x19\x12Q\xaa\xd1\x1dN\x9e\xb9\x80g\x02-\xcc\xfc', 0x20000000000000, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:40 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:40 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$TIOCCBRK(r1, 0x5428) 01:46:40 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0xfffffffffffffff8, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x0, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:41 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000540)=0xc) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r8 = accept4(r2, 0x0, 0x0, 0x0) r9 = open$dir(&(0x7f00000005c0)='./file0\x00', 0x2000, 0x112) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000600)={0x1, 0xd7b3, 0x9, 0x0, 0x0, [{r8, 0x0, 0x57}, {r1, 0x0, 0x9}, {r9, 0x0, 0x2}, {r1, 0x0, 0x6}, {r5, 0x0, 0x4c9}, {r8, 0x0, 0x10000}, {r6, 0x0, 0x77}, {r2, 0x0, 0x101}, {r6, 0x0, 0x4}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x20810, r0, 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f00000003c0)=0xffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x1, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f00000003c0)) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:41 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x0, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:42 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000540)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) fsetxattr$security_ima(r5, &(0x7f0000000140)='security.ima\x00', &(0x7f00000003c0)=@ng={0x4, 0x13, "6e63e59b81ea8c3d0cfa7104f976e2f13e"}, 0x13, 0x1) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:42 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:42 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000003c0)) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = add_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000005c0)='id_legacy\x00', &(0x7f0000000600)='user') sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) 01:46:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x0, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:43 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setxattr$trusted_overlay_nlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x8aa}, 0x28, 0x2) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000140)={'irlan0\x00', {0x2, 0x4e20, @local}}) 01:46:43 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x20810, r0, 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f00000003c0)=0xffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x1, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000005c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) getsockname$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000540)=0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:44 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x40) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x1e4) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_buf(r5, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0xffffffffffffff3e) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:45 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = add_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000005c0)='id_legacy\x00', &(0x7f0000000600)='user') sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) 01:46:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = syz_open_pts(r0, 0x204400) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f00000005c0)="c08d14a9fb57dddef35bc7e3399d054950c9466ae813f853e66a4e713f09de381e476b4d146612a54ae4e0d88c77a6e30f7e5c7327140b933df16fd4abf67f82a3408a9b664329357b604424a3db3648137d6fabddba6f8930c658e24b0a3f223db4a659fb4dc171f6c1f913fba74a2a01102bb121b2fd0fd3f2e909bd6d8c0b7f3613cde42e8b23a2dd0cdbb7b6342ab1f9ee1f25b84faa28bc577e95e0d3084844757704ea179b231b6909c90540252f24b9ec7bfa2183a5bfc4250bd24736aae58d0b35866765268f1e54d511341a1f318f97360416adc8bb283059159eb798d3d2c728a86a389ed6f58fdda0825ee403dc64f3033eef0884cb4ffced132d7ea12118f44f47c114fde9b79de375460a1868d209ba1ac75408e6a7f6a35267cb0b577059a3d57415db355a556118756e10aadb162a4f8c8b185ac01f734edbb6173590a861f73554233b4a9fc6da939fa0d46dd70c75534e3c8f9c8fc981d034d3712126303f101a14af90e215fb92a918b2322548c5f2332b67fde5e92c633cd69c899048d934d067ddf9e87bc0660888ecca145373721e5258ef20b43d5742339664518227f757d01b53408c552ded8a9f10a95b09f126c16cb906e947ca5bd82ab77425e67a7ad762bf04090f960673c5737edc9a39289f258677b9fcdd0428711000cf22fcb0e7298b16f5978943d5e0cc392ca1e11b90141c429ec90abe842fb0ef41be9196549c5cf5f2d4acb40dcfa806b4b04992913c91f06177f07bf92d35c40935645e3e8d308ca6010d87b86f0f6b9f32ee0e38b9ab98eeaae5f8a1d77e74b87298f4562477624f94118ce44d3d70a2ad5b53a36f3795db459b21b44acfc5b4ea68af161fc93a9413d2997b3e59341f83257a6986ee9ac04d1ad91566c79837ed10d61403f4748bcd3be1984ac49d9cdc17263f3b89ef67fd63a79323520e3d88efd36377fcca57fd51d4b2de741ec00b58beafb2665e80ae92e293e39b5d6acdffb31fd56760511449da878a4c6a7134ba6c63e11f2c90148fcc1940aaa20a003c16347adc3dace4aed6f24796c94f7a4ab90765bf6ce9fddfcdb94de4b750c8c5fd859add2282c4f82f7871aaaa11c464515a79a82e3c297f924119052f6d19d6d8b1e612a3257b96220a90633adab6fd1f866ee7462b5d99e1598097b8d6d8d0c404c8974b1a4c8fe8d406ca82b3a87a1cbfa62164767c12b3aefd418cb764c1583c5b0d1a0b214fb38987538adf7c3f7095bd166d8cfbdfddf1ec97fd0a939901b0c3db4fb336bc2b84f07cf2e8c4782831d52267c36784531629f32594d1313b6189da50c9fa9c037b01fa5f8391d72b63ff06c64c27322546d405a45ed0266c6d40957b591357ab95c508e3235c002a1a1cba518cb5501f77111b9443a60422495cc99becf71c17b9e455fd167d1f8f6f249a917a0326e26d569919f147d11bd45aa64bc117ea696dc9f640c142ee87693ea0c7694d1fd1592fe5d0908c3e3bb41a7db13ed22ff257b598e2c9a74275fe385dcca00280bf931b90325cd766e4491285dcddb5a16ec126bac45ab8f360d8210a3514250b131884f60b41453ecfb91c9b1438233020825603f63d00f65395ce4b6f91fb9d48e0be4b5cbf44da7dfec64abc6e9983984d0158372ff9a2d1ba5b5bc9fa992e5e020265356481b9cf4da83771fbd5f368a0549996d3f024d4aa981fb595651c504e4ac6af4aeb40ed4b2c3a9ada1ec1ad63a0092427844b8ff25bdb56c974ec6c115d5e40d13333152e0f91461ec796e96a3baeb7715bcc435dd34b3198509eb03b0cf29386055083066ceef18fccd7d9c1e1755925490581cd3bb927fa54f97d4d0827600dc1f50e5dd19ef2dcb228a75ba69956044bf8a21dd4470ec5cd9f49330257a2e206be77f0db750ab04fd9720729e4e0aca7916d4a087e6ed9bc825abba6de0b8d1fb578fab6438df90d548384c22e08d0a5969948614ad73db7b5723a8885710f13d9a83aa87271ea281da7d843f82612bd6361ece50c761a077add19e5b92f0f00bda79a52a6761689810364cd8518dedf9d78756f0caeed0e88a165e2e051fa9549612fb8b32ad7e418a5d7a1d5a52b895cd6ab6199c696b9fcb29afa9d13b8c185fb52ceab8e8c859f715d8e4f47054a5c65ea507654ada31bad135d614388a2962ecd3823152c355419b2366b76245e31b4830c323a19c1f11dadc686d32a4bb573c263b7123a51ff8e4355ec4abd0eec0f2b18222aa72cd2a0b8763addfd086d42fee76f3405e2e5582d88006d1f02962e9b8a6cef0dd63147c9a042d5287ec266c8f1544085c426f024b1e69f4d7ca71fb69b7eaddb19deaeb26a93bf940fe14ab3c51389a96daa0d27d26a4f185289d7e0977412736be7b1c3697655fd79a2ad7471c2e92cbb753c04d4aa13e7036196c8a588bb9b219d99875bd9c65d1cae5795108445d11e2e0bf769d81d51f1e9df2f7b274525742cf96423fd95ea06065a9cf61d07601a5249b3f231cc0d5b924057ae98a627bbe3a274c2c4b4c8be19aa0d22c27229a10bbc01acf33434ad7741c7eceeb87a4885a26478e5b661654c7ce0bda70c59da6f54bdb6ebae5775daa8ce9db9808727be11eca296bd7df1231a1ebc5e41f23e163ddb672dac38c94ccb164a180784a4932064201c877270859c9a8a7cfbbbe5aff2293ffa671e2dff90a181184e947f4273f84b12f460428a04f0548e5a6004c139544cc0970a8db1fe1efbd4d85748b6de0f7e744d56d7c979b255a124614ddeeedaa84923fc8ee7edb6f3e09ca5ae1631e2e2df37339d7c5c4d0c3382c8efa4225cb663a96cf4b6f7b8dfe7c1fd869068937ddae8312b992387a1ec126d431c053d5c4910524e67f340a86d370edbf76b2e6d2141cdca022d92fe24af30a9be486ff9dba29466378f1919d0b081b142719ee2fdeeca7d0ea7fa7a16c69c93ed5d44391e103fbe3bf8dd79833ec6558d094f5bcaa36fdd712c777a2b450527991ba03be99b08da560e6b95110ce50deb299a3cabb64fcff81904395f443cd9bd4556cf9641e6a42408a9ccc595bdad025db9af1224b3d4a0c1f3589453a0940e85c9e595cf034d52b61c137f368733a47ab08f29bea078d0b0e68d2fd9bb3ca0e36710ec944fec0564041f45affb9395a78f1d7d71a2bff4afde0a336660cb9e3ae3c9822cb3dbbc32f8cbba0e9ba69e578cf076f8b94d3e6abccc69912fa793b73bfeccf33abb0379bbfbb4607d54f4df6eb3b14689f5fbdb6402919af38417fb40d98008442e61cbd21ab9bfd0cd4346a349c038bf43bdcca09d5ea1ceb0bd3ada77004fe0b35c3d2221c03c3ac98c518041ce08164619d8effb81e458189f41fb8127d7fe021dc8db10205300e9c90ddd65f0b259228463302e083aadf0c9ecd68e71df63c610bf06f3f1da8cc27c22be3b86f8a6322004c651d91e702c01c013a45e6a9a8d7c6f5facd91c7a5ea6fa285fa313c0276771727b5571749d707fe1de3b6287ed43e6fafe95b47d4e5d050483975f04d5889fef811b0094ab86bee689859c9fa14f9631f759c8e5a33f9785f5bde36f3ee0ac8786251b135de0f2a44d8781856a4c5d6590a4c0d9e586a336b04b22ca0435b5ce5d2016ae5b43cf87b8d7aed570e2b1cf459f374809b6fade1f10b4a6c08aaed8059c82af75efa0fc07f22c2c763a76ac875f5b285f1950b7b560317a79d6e4df0e342d8056cec9aec95221567e3959805d3390bf5084ceae1dc2f4a2012fb0c6ffbf50fdbe313907b908841990b19e7c01de89ecef6268cfd37d3b5d716d0a3a1db98d6e7a20c05bdd4cc5b6e22bfe7e4a8f9f73fd35511bdd48cd470cbaf4e98bf2de43147a463611fbabed1635d30784873a7f60c70bbc8c948a31800747205a42d28d3b94b3d59ac47e0329de326cb417d8ae97083f6ef9ae3871406343efc64af95df428087d1ac4c030c2f4fcc007bcac4fb7d79181ce0b28f9561a32ea946a60fd7ac9edb422449b0ed0693ad5130c1ca94303d2ed052a796dca20c1bb03ab0002e74499c3604cc48f62f3827a931438294dcd7c9072ffab7a6be0f64215198f03bc16544e84a99bed7df391e0936fb28175363d7d6010db16525a9e5c12f72714d74bc4a72f25072203cd02cb80bf901d4105d582c8f1c7c7d75d513cdba2ad39aa2a3de0cf235defb9af8f2cfa59f457facca1022ae5630ccfba1bf9002ee8b8133e31d243b547cf65d4950409dff3c80c2158ac27c454cd717966010fbf342a494c9d992e6cf750423f0d3b1135cf950a5d52ef5b926bb1232ea48345d28705af571ce4cc6348c6eeafc3efc8e2c55703ef5068202d85e7983467781579314ac037b96fbd3093153c3d15307f49e8af5a7fcd704c814970976f58bbf114a0c73001ea5b73a1c91bbd6052b814cb91a3427fc98e8044bc026f0f7b099faf2796094071c918f38516c6c84587e7d6f3748a5f4d049aa7739f2233c2ee00aa1d0ec544bdf5550fe64cf90329e4fc494031cbd12ae4b7e4cbc8adb2a50868026e060de101dc75f41e3d024e09d99b37cb0c52fae2f240019ed6c59e8e9e6128da4a25c47b6b544c3ce146293b782c90ee383de1ed4e94385749ff169b95c45adcb2fa452911b4abdde57f0ff667df99ac248db11c71166ac969be4c7a2af49fa349b5cbb92f3c20494edc21adee13e546853b0073fa2c99ab5580e2994ee2a725d9d24a256263cb1b9b1d6b3bebff4ff89111cbf446034762131d845d6f7352d623440e546835ca84734fcadb0cd3c9c237d06f6fe409ab130a7f004f19020e2986cc4afce45341747ef76ccf82c64cfedf6e9bc13fd441eddc31f9b2daf248d36d3d7713704835b644095c09d6fa1c5460129732c31fcf7cb06dbabf2c8ffc4c287564948a307b742ebc2f2c391ca12bbcd38a7274dc216f891ef8911ef32b3b8723a649669cdcee1bca577e220d14a94f816242db7c30638f3ce4864d7053a5c68402881d749c5b5b1602e21b5454771db7d0c8f1027c73b543d04bd20a8cd2564eca92eb94745983184e797584e8f69e1657cde4159f2d1909f71aad1dfc9e59c46cd3b7af7369112916e7a32dd56f32fb2af74c27b8998c15836c4baa337a42deae6523b2fb98a4522abf6ea443e7e18196feb0fba07ba8a1f34e21df5ace728fec533b47527201ba42f017fbc7662d751cb31d12d8290cb25ee4e5fbf796be17270a7f7067572a19462a3223daf72ded0be760f192a64db36117faeb9be48461fcf2a565e9ea3a11bf72d4f8219f8ea73ef315cfed7ee33e3738cce8443835fc45538b6861373651648078f4e69fc5e770abe30d107c104f8c457ecc2a226e943f5898ea627c5c9265c98296b0857098aee73f014064080ebc0a4b1dc25a85ffb9ac3de621b976034caae709d598255131bdd2ec324a1f21a7ecda9d5e331c6291c32230528173424470473e0b35dc3ab1ba68ef07bd6927c5ababfd09876a78243babf8059e189c0ceb4be4565807f3fa1f7c8d7c6457f1cd55b40e488c9dac3bc63ad044ee58c94ee2620725e0097303e780d5f3a7f2e35391d3be21a138789a7f17e92d744677ee49e434f489a7890b6e0ec7d27a74ae76b59e85fafe3b3c42731d2a7605f5188f6debc4aed3b4f4d1e0fc5178f46a3b60d875e222a76bd9a4234656436b76500dbaff18e724a6d0be8528cc553d682f043e72c1c854dd3cfae0f419c354856c5963409b218b3506c60278676712e9165292597ee2d8fad52d3918bb756e21383af527ec487e2e0f71") r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r1, &(0x7f00000003c0)={0x8}) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:46 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r9, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) sendmmsg$unix(r4, &(0x7f0000001280)=[{&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000640)="f533471539113c550fb7ca2471cbee22820accfe1aa86c7e209ad8c6a5207229b4f344942a6a6cc411439bc9a4dc797bb18b5564d314ebe9929901e19a680444770addc74089491fd676aa0446fe99f794243ee65585441b6367318f6b5d152e8c6270f6305a1852767ea2ab62a9e023e1461b000f0c568ea1541c3b6b8daa50f39480fa04a33ace66a93a8f3c8edd84ea6f57e2371342aab5f8bc23e8451c83d5f5a4d6953ce787adacd4c69f999e02d8a753f32e63cd93782f9de116c0d881deb867b16db1a1f5812a5f434c1b03281c290d51e0134aa0c818fed793d1ea27f6c934f57a55436a7bdb889eec", 0xed}], 0x1, &(0x7f0000000540)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x40, 0x8800}, {&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000d80)=[{&(0x7f00000007c0)="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", 0xfe}, {&(0x7f00000008c0)="883e2d957f5350ad9239b8014e2517c1ab1146f85e2ad71f5f80f5be8c29e6fc79019612aea69a8162ac364b60744c2f7592e4339ceb0a51f2785cc666b8072be0185ff4cd1a2a8b8799d225af2da6990ebc28f08f1abab79570169fb3e989e32e59f62af30995ae0403ccc4d7ec69d435a3fefbd121ebae00f706b397be13d99620ebc8a5e3114de3cba84e77e4168c0bed8c98f17be3fc547f21605031b054ce6117191c4938c530f9d59de113e8e17dcc4e1b2f4b64fe681e09c567116986d00e01457303aee1342404649a221291ddac354536b077079e5ddc1808e27897b283352637cfec9105819cb73b63", 0xee}, {&(0x7f00000009c0)="fb2526c12962e76971aadf4d0851f5b8150f5ea7d07a77310095698f92452ee8c0d2171ecdee09c2001bcc883ba5caef56b2d35596ee57e1f8f56846858548b7f466903a8e39ea4298a5973edc8e848f18f33c716f5d5f7ab63434", 0x5b}, {&(0x7f0000000a40)="9bc643ff348be49ea5408e0a3216ad9d61a7bb083bc9bf7c14a466070d3f9928793debf8e5fa50fa76f62de137440848524ce91f4f2d5c6e43989ca8cb772f74c1cbc6ddc25767c7ce", 0x49}, {&(0x7f0000000ac0)="4aa0ac1fbec813e90d51c777ec0eafbbff0c6d1f8001d87eaa04c6073ef8fd3c9dc8cef2069b5c3908d44edfffefee2966684a773059463d66b41484d0a95fbaa35e251ef3c7e8fc5d0df6996a7faebb794863ac3674fd39d5246dc357891e7840483aa923cdcc7578cf9ba83bd5ac03c6a4fd42230f76da6638c16505de93c310292c418e969b7e53f244558b0e5a2b45dc6e81785e1f0c5760a34f54f0701630c5b6016e233ded77f44a65d9abfaefe4b43f1a4e508344e72d4bb50240fcd159046eaad1daf3d97f", 0xc9}, {&(0x7f0000000bc0)="30dff98f59572d6e4972eeb36766a1dedc94992593372696a17bd4fea68b94d25d232c7942ab9138bde4311cbb3b38ae61bcf4630f837e5a55d92abaaadd81f24e6878b2787846462d7af00479280b7e0c5d254f6fe895504edaf70372b39a740c42c5c2138a31a227a99a570b29bffcdff6f5a1c0247c230d51450fe34ac662689c52ae318774b12ae05381eed9f0f2ede9", 0x92}, {&(0x7f0000000c80)="aaf8b87a988c16551f5d32f4", 0xc}, {&(0x7f0000000cc0)="5954311c27ef1be8a5c333991059df726ad80e83133111bc4e69e7a3992ae3f75d323cbd1f3acce1b4046a4cf4e9ea733327540533fb944544264d3455d68d27519330785d6a4864aea05732ce4a56da3cec0534d3635fe1ebb7a8c3e703d56660eb499c9291ad0af84d76e55431fac51794fdf85d9f25c209fd55f8bfd48a016b19bd6f4d96e1653835c57f15f5c8c4b81e3a15c7d6d76d8e2b99972917f12893cacc192099d85f458f7b2733dc72aac82615a8eee9832cce38a420", 0xbc}], 0x8, 0x0, 0x0, 0x10}, {&(0x7f0000000e00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000000e80)="fc071bd284ef11c9ea85679803947c9fc018ef993defd32e08664b119508f5669d4edd", 0x23}, {&(0x7f0000000ec0)="3eca61d3b550dd019da5a01a79ca79b95317371b1c269b2bf28dfb84284638b8832923bdf3a33389fe8245dab54f3edd5a6f787162eeb84df8e4865683513084083729eeaa9ed4cba2a463bb97d38b7a3034696ab1eaa4bd744fce708c3d53452ae0c1334a4992077a4d1c7f392f29444a3ec51aad1daea17ac6", 0x7a}, {&(0x7f0000000f40)="2dd8332e0f01fc3ca201f3ae5c3fa2861576577dac7c23ad4daae930eabac7221a2b928a845859829a9e2a0fe5ad79f73988654b1abf9bd9e09bd726e94a2c02749ef4147358e72121ac062d6ccb02f6945f1bdc9dea936f1680b4bb98f769b49fb38a6237796892950b3598b366a898539068202d8525bd16f9c089e0ae44974aef16198ed9e5e83e60fe81a7", 0x8d}, {&(0x7f0000001000)="24d5ad6b424389de345c3a26ec1489b0c91854b15689ebb69133def1b4a186b6cb6ee252db344c7def83297ea0436a56d95d8f236953c238c557559fa7160ecb357b10d88a2602df9d8bbd6cb0b00eb4504e2307478a88c8e4def61b31a822a2a864436012858467e459ece6ecb8f58dbd425b56078c2f0250b6d884722319cc4a4c13ff0fc305668997ebde219067f78b4972ebc2", 0x95}], 0x4, &(0x7f0000001100)=[@rights={0x18, 0x1, 0x1, [r2]}, @rights={0x38, 0x1, 0x1, [r1, r3, r1, r2, r9, r2, r5, r1, r1]}, @rights={0x38, 0x1, 0x1, [r0, r5, r4, r2, r1, r9, r4, r9, r9, r4]}, @rights={0x30, 0x1, 0x1, [r3, r9, r9, r0, r2, r2, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x30, 0x1, 0x1, [r0, r1, r9, r3, r3, r4, r4, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x168, 0x20040040}], 0x3, 0x40000) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:46 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = open(&(0x7f0000001340)='./file0\x00', 0x0, 0x8) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000340)={{0x2, 0x4e21, @empty}, {0x8000000000000307, @remote}, 0x32, {0x2, 0x4e20, @local}, 'bond0\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r6 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) open(&(0x7f0000000140)='./file0\x00', 0x20100, 0x110) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) write$binfmt_elf64(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="7f454c4601000380050000000000000003003e0000000000540000000000000040000000000000002a0100000000000008000000040038000200815d6d0a0000050000009d83ad6202000000000000000104000000000000030000000000000001040000000000008000000000000000080000000000000051e57464040000000200000000000000ffff0000000000004b000000000000000900000000000000050000000000000001000000000000003c484f1c888cc1351f80501ed435f3b6f6aea53bcedb3df590237f56ae5a37624db8f641e8245ad286bf1107e684534edc7fa5ec32f86c676252a123a989268b7a1e718039c84209053a59ac587107de6c247e7a7363fd96ea958bfc3cef0d5f83b20b442c777ea5692beb9ea1bc1e962511b642f3d63d57a1cfef7423214c289120546969c602d06f6953708f7655fec25afb26f8e67dfc5fe1e2be2e94d0e8cb71ddfdd78f58d2e73b0720249146e037d0214934b79c502e5b71a03cc02c3a0b9482b95631aeaa9eb1a92c96b475f4c83098cc00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb84) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001180)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000003c0)="507dc0ed8c3527e5859feea1f7efe31018c96acea1c81edd4e617c2560b3f50184143676b47569ef70d20dd7db424c6751853f75ab", 0x35, r6}, 0x68) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000140)={0x8, 0x6, 0xb000}, 0x4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:47 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='ntfs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x47fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x100000000, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x2, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000680)='pstore\x00', 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c, 0x800) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000600), 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req={0x0, 0x7d, 0x4, 0x7}, 0xd) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000640)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0x1800}) accept4(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000140)=0x7ff) 01:46:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='personality\x00') ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000540)) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000280)=0xfffffffffffffffe) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000600)={'bpq0\x00', 0x4000}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0x0, 0x20000000, &(0x7f00000005c0)={0xa, 0x4e22, 0x80000000, @remote, 0x9}, 0xffffffffffffff57) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = creat(&(0x7f0000000840)='./file0\x00', 0x11) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000880)) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) sendto$inet6(r4, &(0x7f0000000700)="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", 0xfd, 0x4000000, &(0x7f0000000800)={0xa, 0x4e20, 0x10000, @mcast2, 0x8}, 0x1c) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000940)='/dev/zero\x00', 0x2080, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0xd) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000140)=r6) r9 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f00000005c0)='/dev/input/event#\x00', 0xfffffffffffffff9) keyctl$get_security(0x11, r9, &(0x7f0000000600)=""/225, 0xe1) 01:46:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) r3 = fcntl$dupfd(r1, 0x0, r0) mknodat(r3, &(0x7f00000003c0)='./file0\x00', 0x8000, 0x1f) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x80000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40020000}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r3, @ANYBLOB="02012cbd7000fcdbe6250e000000b0000500440002000800010014000000080004000101000008000200fdffffff0800030007000000080002003affffff0800040000100000080001000c000000080001000f0000000800010065746800080001007564700024000200080001001900000008000200090000000800020006000000080001001b000000340002000800010016000000080003000100000008000300030000000800040001000000080001001b0000000800030007000000"], 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x4040000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r4, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='ntfs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x47fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x100000000, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x2, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 967.585505] audit: type=1400 audit(1551318409.758:1082): avc: denied { create } for pid=10089 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x1c, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 967.756634] audit: type=1400 audit(1551318409.928:1083): avc: denied { write } for pid=10089 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 968.198699] audit: type=1400 audit(1551318410.378:1084): avc: denied { read } for pid=10089 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000840)='net/snmp\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev={0xac, 0x14, 0x14, 0x24}, 0x4e23, 0x0, 0x4e23, 0x20, 0xa, 0x20, 0x80, 0x88, 0x0, r5}, {0x400, 0x9, 0x6, 0x80000000, 0x0, 0x7c, 0x7, 0x2c5f}, {0xe3, 0x6, 0xef, 0x7}, 0x1000, 0x0, 0x2, 0x1, 0x2}, {{@in=@multicast2, 0x4d6, 0xff}, 0xa, @in6=@loopback, 0x3505, 0x6, 0x1, 0x7, 0x8000, 0x8, 0x1}}, 0xe8) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:50 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='ntfs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x47fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x100000000, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x2, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280), 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000003c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:51 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000003c0)={'lo\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e23, 0x8, @rand_addr="45dd8178194bf48c9fa65d8d5e0211c8", 0x10001}, {0xa, 0x4e20, 0x6, @rand_addr="b0b0c24cb40a422648a53cc1bef2df84", 0xd657}, 0x1, [0x7f, 0x4, 0x400, 0x3, 0x7, 0x8, 0x5, 0x7ff]}, 0x5c) 01:46:51 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280), 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280), 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000700)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$PPPIOCDISCONN(r4, 0x7439) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) arch_prctl$ARCH_SET_GS(0x1001, 0x2) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) readlinkat(r4, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f00000005c0)=""/210, 0xd2) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) socket$inet6(0xa, 0x3, 0x25) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) mount(&(0x7f00000003c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)='qnx4\x00', 0x20, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TCSBRK(r3, 0x5409, 0x3) listen(r2, 0x80) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) syncfs(r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x400, 0x2) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f0000000700)="2cdf99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad340000", 0x1e, 0x4000001, 0x0, 0xffffffffffffff26) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = dup2(r1, r1) getpeername$netlink(r4, &(0x7f00000003c0), &(0x7f0000000540)=0xc) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) fsetxattr$security_evm(r4, &(0x7f0000000240)='security.evm\x00', &(0x7f0000000600)=@sha1={0x1, "01e87c995a93ff73c94e733c7b64a17fc92b49dd"}, 0x15, 0x356d1df2a0f72198) 01:46:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'\x00C\x00\x00\x00\x00\x00\x00\x00\x00V\x01\x00', 0x102}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) mount(&(0x7f00000003c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)='qnx4\x00', 0x20, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x4003f, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x7f) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) write(r3, &(0x7f00000005c0)="9dee45477f05f9d67acd174a10d399ff0750a6cd76c81a26db6a3733596a8087588db707e934db398ad2d0fe3134807455de434b83da044cd3c2d9120189c50b007ea4735544611ad9625d802b96c5138f30ece1474ee139fee6d2a8e3abbefbc26aa53e75580930076a104a9fe3bccab18ab1e796b9fbe8b468c586675cf04ba730c6ac5d7c82555b649811fe10babb9fe9638c7ad82f413185184a0f3d40b0c9a016683ad399", 0xa7) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000700)=@req={0x9, 0xc3f, 0x4, 0x100}, 0x10) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000004e8efa7fd022c936bbc52e7aa050e69a3ed2af4f30bc39894f339046719c6471fd129e32dedb9ffbd8595d9f9309da097e7c58849af92d2271dc4797090e2aff3ddd257e"], &(0x7f0000000540)=0x72) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f00000003c0)=0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) listen(r1, 0x7fff) 01:46:55 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:55 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000005c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x10000, 0x0) openat$cgroup_ro(r3, &(0x7f0000000540)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='ip_vti0\x00', 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:55 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) mount(&(0x7f00000003c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)='qnx4\x00', 0x20, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x80, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) r6 = request_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f00000005c0)=':eth1losystemvmnet1proc\x00', 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, r6, 0x748c, r7) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22, 0xfffffffffffffffd}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x406, r6) r7 = fcntl$dupfd(r6, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = socket(0x400000000010, 0x3, 0x0) recvmsg(r8, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/146, 0x92}, 0x0) setsockopt$sock_int(r8, 0x1, 0x22, &(0x7f0000000080)=0x522, 0x4) write(r8, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x101101, 0x0) mknodat(r10, &(0x7f0000000540)='./file0\x00', 0x900, 0x80000000) setsockopt$packet_rx_ring(r9, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) 01:46:56 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x1b, &(0x7f00000003c0)=0x3, 0x4) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) ioctl$TUNSETOWNER(r2, 0x400454cc, r6) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4007d, 0x0) fcntl$notify(r5, 0x402, 0x10) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000006c0)={'syz_tun\x00', r3}) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0xa0}, {}, {0x0, 0x7fffffff, 0x0, 0x2000000000}, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in6=@local}, 0x2, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xfffffffffffffe02) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) recvfrom(r7, &(0x7f00000003c0)=""/29, 0x205, 0x3, &(0x7f00000005c0)=@generic={0x10, "293912a69afa345551583aa73a7144ec5393d03b0a20677ca2ec99f035468ca5c6f1abe31693d1e491ff727b9e59ebee9dcadf44a66778e0ba898981e0ee1d78aaca3b0a221aa6f9de8d2ea1ee79e82adfc0507e8505ce493f33f268ddc872ab8597f5e0493104985143f1950efb8b05ae03638d5bf093b1fd919a9b49d1"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r5, 0x0, 0x0, 0xffffffffffffffff) 01:46:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:58 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 976.066236] audit: type=1400 audit(1551318418.238:1085): avc: denied { create } for pid=10357 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:58 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syncfs(r0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 976.210372] audit: type=1400 audit(1551318418.388:1086): avc: denied { write } for pid=10357 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:46:58 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4007d, 0x0) fcntl$notify(r5, 0x402, 0x10) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 976.576205] audit: type=1400 audit(1551318418.748:1087): avc: denied { read } for pid=10357 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 976.810368] audit: type=1400 audit(1551318418.988:1088): avc: denied { create } for pid=10357 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:46:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f00000007c0)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x1, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000780)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000800)=ANY=[@ANYBLOB="9e90a5246b172480b9eb519768000000", @ANYRES16=r8, @ANYBLOB="100025bd7000fddbdf250400000008000600cdf400004c000300080001000300000008000100010000001400020069726c616e3000000000000000000000140002000000000000000000000000000000000008000300030000000800030000000000"], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x20000011) recvfrom(r4, &(0x7f00000005c0)=""/117, 0x75, 0x101, &(0x7f0000000640)=@l2={0x1f, 0x7, {0xfffffffffffffff8, 0x9, 0x1000000000000000, 0x8, 0xd3, 0x3}, 0x40, 0x4}, 0x80) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r9 = socket$inet_tcp(0x2, 0x1, 0x0) lchown(&(0x7f0000000080)='./file0\x00', r5, r6) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:46:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000005c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000000c0)='highspeed\x00', 0xa) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000003c0)={'icmp6\x00'}, &(0x7f0000000540)=0x1e) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:46:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:46:59 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 977.754269] audit: type=1400 audit(1551318419.928:1089): avc: denied { create } for pid=10403 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_out(r2, 0x5462, &(0x7f0000000140)) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) connect(r2, &(0x7f0000000640)=@caif, 0x80) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f00000005c0)=ANY=[@ANYBLOB="02000500421542bc3130d1d52eefef0908694d9993babf73374c35fcae8a58eac9a220fe1aaaca568c2bafebcc6d86b5bca227bc23a5bd2c0708e790245916565d89b01ea0c31286cc9109bd8b37f313296a3f39e0b542d81203cc7d78891cd7be3d0e31be097fbdfdb6a56969de417c689911308919"]) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$TIOCNOTTY(r4, 0x5422) [ 977.918854] audit: type=1400 audit(1551318420.098:1090): avc: denied { write } for pid=10403 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4007d, 0x0) fcntl$notify(r5, 0x402, 0x10) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 978.278407] audit: type=1400 audit(1551318420.458:1091): avc: denied { read } for pid=10403 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:00 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000003c0)={0x4, 0x1d, 0x1, 0x52a, "f003b6d0d18ecc2ccfb5848e14bb03d0c033d05372249d86693b75944ca4f1eb"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000540)) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f00000005c0)=""/226) 01:47:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) write$FUSE_ATTR(r7, &(0x7f00000005c0)={0x78, 0x0, 0x5, {0x1, 0x7, 0x0, {0x6, 0x2, 0x100000001, 0xfff, 0x200, 0x5, 0x6, 0x7fffffff, 0x7, 0xa3b, 0xfffffffffffffffe, r5, r6}}}, 0x78) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:01 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:01 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000140)=""/52) 01:47:02 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 980.054244] audit: type=1400 audit(1551318422.228:1092): avc: denied { create } for pid=10486 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000540)={0x80, 0x3, 0x3000}, 0x4) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 980.188664] audit: type=1400 audit(1551318422.368:1093): avc: denied { write } for pid=10486 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 980.462127] audit: type=1400 audit(1551318422.638:1094): avc: denied { read } for pid=10486 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x48000, 0x4) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="000107bd7000fddb0129d31317aa9f76e69f3905000000000000008b5f49866f"], 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000000) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r3, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x807ff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) keyctl$session_to_parent(0x12) write(r5, &(0x7f0000000380), 0xfffffffffffffeaa) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r4, 0x0, 0x0, 0x0) 01:47:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:03 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:03 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000003c0)=""/19) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) read(r3, &(0x7f00000005c0)=""/219, 0xdb) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 981.360016] audit_printk_skb: 6 callbacks suppressed [ 981.365180] audit: type=1400 audit(1551318423.538:1097): avc: denied { create } for pid=10526 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 981.391119] audit: type=1400 audit(1551318423.568:1098): avc: denied { read } for pid=10518 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 981.524887] audit: type=1400 audit(1551318423.698:1099): avc: denied { write } for pid=10526 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:03 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 981.950817] audit: type=1400 audit(1551318424.128:1100): avc: denied { create } for pid=10549 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0xcd, 0x6, 0xb53, "f8f718809cba530193695ca469d3e45b", "96c60143d4c0ee03947eac9353aa862780bac2c811fa01399aaf08eacd9ce8a1041f197eb928b4335361c59c7d7ff044e2afb501112a6decef553e71ef58aad788aab381d505b03bf13bd72cfef7e54358c42549163937d13aa13f974e6dbfb914efaf2d32c6a2aba1fb0c338b0c9d8f495a6d0403c504cce0abc52a7c95a39d8bc3a3e2ec5b18432751acc4472777040fe6413be32099ccd2489941e77be6e4aeb32aba416b5daa6348f25b9bd7a48bf2dc0c37ef384aae"}, 0xcd, 0x2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000003c0), &(0x7f0000000540)=0x4) [ 981.993264] audit: type=1400 audit(1551318424.168:1101): avc: denied { read } for pid=10526 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:04 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:04 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x807fe) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 982.715558] audit: type=1400 audit(1551318424.888:1102): avc: denied { create } for pid=10549 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:05 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) rmdir(&(0x7f0000000140)='./file0\x00') bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 983.080676] audit: type=1400 audit(1551318425.258:1103): avc: denied { create } for pid=10577 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 983.276449] audit: type=1400 audit(1551318425.448:1104): avc: denied { write } for pid=10577 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x1) mkdir(&(0x7f00000007c0)='./file0\x00', 0x11) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000540)={'lapb0\x00', 0x4000}) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) getsockname$netlink(r2, &(0x7f0000000740), &(0x7f0000000780)=0xc) listen(r3, 0x80) ioctl$TCSETS(r2, 0x5402, &(0x7f00000005c0)={0x538, 0x6c76, 0x2, 0x1, 0x13, 0x4, 0x9, 0x1000, 0x8, 0xfff, 0x9, 0x5}) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000700)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x1, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000880)=""/13) sendfile(r0, r1, &(0x7f0000000040), 0x2) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r1, 0x0, 0xfff6, 0x44000, &(0x7f00000006c0)={0xa, 0x4e22, 0x0, @rand_addr, 0xffffffffffffffff}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x84400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x7) write(r4, &(0x7f0000000280), 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000340)={'veth1_to_bridge\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 983.722025] audit: type=1400 audit(1551318425.898:1105): avc: denied { read } for pid=10577 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) bind(r4, &(0x7f00000005c0)=@vsock={0x28, 0x0, 0xffffffff, @reserved}, 0x80) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) fsetxattr$security_ima(r3, &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000540)=@md5={0x1, "676bec94f04f5e6dd1f304768ea4d7a0"}, 0x11, 0x2) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000600)='dcp\x00', 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1f, 0x800) 01:47:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x48000, 0x4) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="000107bd7000fddb0129d31317aa9f76e69f3905000000000000008b5f49866f"], 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000000) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r3, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x807ff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) keyctl$session_to_parent(0x12) write(r5, &(0x7f0000000380), 0xfffffffffffffeaa) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r4, 0x0, 0x0, 0x0) 01:47:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = socket$inet(0x2, 0x5, 0x6) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000003c0)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 986.028986] audit: type=1400 audit(1551318428.188:1106): avc: denied { create } for pid=10671 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000600)='jfs\x00', 0xfffffffffffffffd, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000003c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getdents(r0, &(0x7f00000000c0)=""/15, 0xf) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) sendmsg(r1, &(0x7f0000000540)={&(0x7f00000005c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000640)="5c84359935b099275e5ecbe0ab10786e753b858aac2c61c3a8a1d704355a2f8df3b8561630c28d32b7c1ca3f0ac2ee66b39fd2cab07755ad064fd72340a64cbda5f6db2395ca2d629a13455382b3acc2e02e45f1582aad2995e5db72eaa80a213dc82f05a1031549c85456c7712e4f7b5b583e5158332a1694b8f8dc4d0bea862772843a8193cf0245", 0x89}, {&(0x7f0000000140)="3f5a11afc9ec96ad205c71fa650b61cc81039c", 0x13}], 0x2, &(0x7f0000000700)=[{0x98, 0x107, 0x6, "596d52a0a79cac2c19216951d9cf1b0f2338295c47fb5802ba7b91536619945375759cae1f61e55e55defb5a2e5d3373bab7feca4e4c050383c1a8ed0c0bd24f8847a7fe18425f01887d3e54c5186229542ce54aa32852f3ec23d0cd2e8209adba31aa60a8ad014261a03d98294cb774223d34c1970e394d0c573e361e4ee095ea"}], 0x98}, 0x4001) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 986.422507] audit_printk_skb: 3 callbacks suppressed [ 986.429699] audit: type=1400 audit(1551318428.598:1108): avc: denied { read } for pid=10671 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) write$FUSE_ATTR(r7, &(0x7f00000005c0)={0x78, 0x0, 0x5, {0x1, 0x7, 0x0, {0x6, 0x2, 0x100000001, 0xfff, 0x200, 0x5, 0x6, 0x7fffffff, 0x7, 0xa3b, 0xfffffffffffffffe, r5, r6}}}, 0x78) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000005c0)={{0x1, 0x1, 0x81fe, 0x1, 0x7fffffff}, 0x1, 0x81, 'id0\x00', 'timer0\x00', 0x0, 0x9, 0x0, 0x37, 0x5551}) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000005, 0x20050, r0, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='fd/4\x00') r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r5, 0x628, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f00000003c0)=0x401, 0x4) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:10 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) fcntl$getown(r1, 0x9) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:10 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) write$FUSE_ATTR(r7, &(0x7f00000005c0)={0x78, 0x0, 0x5, {0x1, 0x7, 0x0, {0x6, 0x2, 0x100000001, 0xfff, 0x200, 0x5, 0x6, 0x7fffffff, 0x7, 0xa3b, 0xfffffffffffffffe, r5, r6}}}, 0x78) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 988.707094] audit: type=1400 audit(1551318430.848:1109): avc: denied { create } for pid=10758 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 988.847328] audit: type=1400 audit(1551318431.028:1110): avc: denied { write } for pid=10758 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:11 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0x1f, 0x100, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000000f00)=""/31, 0x1f, 0x100, &(0x7f0000000540)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) write$binfmt_aout(r5, &(0x7f00000005c0)={{0x10b, 0x8, 0x400, 0xc1, 0x97, 0x2, 0xf8, 0x8}, "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", [[], [], [], [], [], [], [], []]}, 0x91c) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') 01:47:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 989.281674] audit: type=1400 audit(1551318431.458:1111): avc: denied { read } for pid=10758 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 989.388220] audit: type=1400 audit(1551318431.568:1112): avc: denied { create } for pid=10758 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:11 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00', 0xffffffffffffffff}) 01:47:11 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0x1f, 0x100, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:11 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) write$FUSE_ATTR(r7, &(0x7f00000005c0)={0x78, 0x0, 0x5, {0x1, 0x7, 0x0, {0x6, 0x2, 0x100000001, 0xfff, 0x200, 0x5, 0x6, 0x7fffffff, 0x7, 0xa3b, 0xfffffffffffffffe, r5, r6}}}, 0x78) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0xffffffff00000001) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000003c0)={'syz_tun\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) sendfile(r3, r5, &(0x7f0000000780), 0xa0000000000) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xf4, r7, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2400000000000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x75a5}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x23}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0xf4}, 0x1, 0x0, 0x0, 0xc080}, 0x40) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0x1f, 0x100, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 990.284904] audit: type=1400 audit(1551318432.458:1113): avc: denied { create } for pid=10804 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 990.454352] audit: type=1400 audit(1551318432.628:1114): avc: denied { write } for pid=10804 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 990.559583] device lo entered promiscuous mode 01:47:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_POLL(r1, &(0x7f0000000540)={0x18, 0x0, 0x8, {0x8e9}}, 0x18) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f00000005c0)='bic\x00', 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 990.851777] audit: type=1400 audit(1551318433.018:1115): avc: denied { create } for pid=10827 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:13 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000000f00)=""/31, 0x1f, 0x100, &(0x7f0000000540)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) write$binfmt_aout(r5, &(0x7f00000005c0)={{0x10b, 0x8, 0x400, 0xc1, 0x97, 0x2, 0xf8, 0x8}, "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", [[], [], [], [], [], [], [], []]}, 0x91c) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') [ 991.035139] audit: type=1400 audit(1551318433.208:1116): avc: denied { write } for pid=10827 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001080)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000001040)='neu/rt\x1b\xdc\xe2\xe3Ox\xbd\xbc_\xff%cje\x00') ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000f00)="016666e9bff8a97a310377dc4969283db3122e7d49121f59f5dd61ebd28bb58c25f0755c3fa3f1528d67c9f6e82463faecdf9805bda3b0f009a197682acadfeeb59a48f8f49c655b623b968122f22df8b9449dfc506fb4062e20b4383f888c841ce3408edefbe5a30d58fb83a4c2d9bbc540529da7eb862873ad3980f65e2fc3aebfd747a37837fac88865d91591255ce7010cb1dde897ab372cbb0abd65706610cd656721866e9738ccafa444673e5177969c16b99f73288977ea044d29d14df85267200e29861a694bd7ce") mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r3, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100000000000000, 0x0) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r6, &(0x7f0000000e80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)={0x884, r10, 0x301, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r7}, {0x26c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x7, 0x180, 0xfffffffffffffff7, 0x9}, {0x7, 0x2, 0x80000000, 0x400}, {0x2, 0x38, 0x139, 0x7}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r7}, {0x234, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff00000001}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3ff00000000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1311}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0x15c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xcdde}}}]}}, {{0x8, 0x1, r7}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r7}, {0x154, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x5, 0x2, 0x1, 0xf405}, {0x8, 0x1, 0x5, 0xe40000000000}, {0xa83, 0x0, 0x1f, 0x4}, {0x8, 0x8, 0x6, 0x3}, {0x8, 0x2, 0x3ff, 0x3ff}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}]}, 0x884}, 0x1, 0x0, 0x0, 0x1}, 0x20000050) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 991.386846] audit: type=1400 audit(1551318433.558:1117): avc: denied { read } for pid=10827 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:13 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000003c0)) 01:47:13 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:14 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000000f00)=""/31, 0x1f, 0x100, &(0x7f0000000540)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) write$binfmt_aout(r5, &(0x7f00000005c0)={{0x10b, 0x8, 0x400, 0xc1, 0x97, 0x2, 0xf8, 0x8}, "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", [[], [], [], [], [], [], [], []]}, 0x91c) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') [ 992.754168] device lo left promiscuous mode 01:47:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) mknodat(r5, &(0x7f0000000540)='./file0\x00', 0x3018, 0x200) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) openat(r4, &(0x7f00000003c0)='./file0\x00', 0x0, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = dup2(r0, r0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x5, 0x1, 0x1, 0x8, 0x3, 0x5a}, &(0x7f0000000540)=0x20) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000005c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat(r1, &(0x7f0000000600)='./file0\x00', 0x11) r4 = accept(0xffffffffffffff9c, &(0x7f0000001700)=@rc, &(0x7f0000001780)=0x80) accept$inet(r4, &(0x7f00000017c0)={0x2, 0x0, @remote}, &(0x7f0000001800)=0x10) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$ARPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x63, &(0x7f0000000140)={'HL\x00'}, &(0x7f00000003c0)=0x1e) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioprio_get$pid(0x1, r5) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 993.748241] audit_printk_skb: 36 callbacks suppressed [ 993.753472] audit: type=1400 audit(1551318435.928:1130): avc: denied { read } for pid=10912 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:47:16 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0xffffffff00000001) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000003c0)={'syz_tun\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) sendfile(r3, r5, &(0x7f0000000780), 0xa0000000000) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xf4, r7, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2400000000000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x75a5}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x23}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0xf4}, 0x1, 0x0, 0x0, 0xc080}, 0x40) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000540)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000640)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f00000005c0), &(0x7f00000003c0)=0x68) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x800000000000}, 0x2df) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:16 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0xffffffff00000001) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000003c0)={'syz_tun\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) sendfile(r3, r5, &(0x7f0000000780), 0xa0000000000) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xf4, r7, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2400000000000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x75a5}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x23}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0xf4}, 0x1, 0x0, 0x0, 0xc080}, 0x40) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000003c0)=[@mss={0x2, 0x6617}, @sack_perm], 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:17 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0xffffffff00000001) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000003c0)={'syz_tun\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r5 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) sendfile(r3, r5, &(0x7f0000000780), 0xa0000000000) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xf4, r7, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2400000000000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x75a5}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x23}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0xf4}, 0x1, 0x0, 0x0, 0xc080}, 0x40) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) write$binfmt_misc(r4, &(0x7f00000005c0)={'syz0', "49008bbd835a6a085f85ec2cf68c4163fde1ed55e1dda953fc2a4363d6c66197974366878be5f5a8db44c42ff0e05b86746d8a207fd77177ef45d2e55961bca9d15a8ee5f62dd076327fa55023de2a992ca6e41ac29449fb0a7189bf7ef14ad63b4e34e2d8ce1e26656632f814e100617f44846f58bc1f6164506cc90bb479e0e8d64c87e3a3c8b3dbab445bca7548d87a05bddfd680f5511b0aff50c3cc9c7e2f17e78e8a177f1b98fdb554231fb67db46cea8d4bda2ddc32e215b0e59f2e9ab6123f14dc6e66618c7d5d4a3ea4d166a766ca6bf4270708c5a6a94dd6bf0f4608c778fbd45cb7af5a5641cc2b"}, 0xf1) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioprio_get$pid(0x1, r5) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x4007f) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) listen(r5, 0xfffffffffffffff9) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000640)="146817e4357e141514ef6f6a75f28e29d1cd1996525239c7c95021a7b21988bb54cd33a6f1e75a834891d3d10000000086e538138049bf74d432e499cfefda5c7ec029cad99d9baacbd9edc3000000", 0x3f) ioctl$EVIOCGABS20(r5, 0x80184560, &(0x7f00000006c0)=""/242) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000023c0)=[{{0x0, 0x0, &(0x7f0000002240)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 01:47:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000003c0)=[@timestamp, @sack_perm, @sack_perm, @mss={0x2, 0x1f}, @window={0x3, 0x2, 0x8}, @mss, @timestamp, @mss={0x2, 0x1}], 0x8) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000540)={0x3}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101200, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000005c0)=@generic={0x3, 0x8, 0x5}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @mcast2, 0x4cb}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'bridge0\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f00000003c0)={@initdev}, &(0x7f0000000540)=0x14) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000005c0), &(0x7f0000000600)=0x8) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) io_setup(0xd9, &(0x7f0000000640)=0x0) io_submit(r7, 0x2, &(0x7f0000000800)=[&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x7, 0x1, r4, &(0x7f0000000680)="0d2d55f475454b16d6f6ba8641661ae50e7358095f3c722628b0f9b04a951a1b05cf2ea2c667df286416700649ac60", 0x2f, 0x3f, 0x0, 0x0, r4}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x6, 0x9, r4, &(0x7f0000000700)="90c8cd609a263e54683ac17e0d0ae984f25a01e58a24824909da1177a935e0d6e79c3d1a236a1db3cfc00cb222720408df14afcf54e3bd73abaa21de6aac16da78b08f758207a2f4865c0ad89c4c7f8587a1698258f8175f2cacd03ead168d097a10fe6f6e28e373195b1aa595d126366001d8dbe736d104f3ae2978e22bc6e8c69f6970c66dd87c84507b34a9f1191b52d7bb582f2349afb81555c50e825cc51e94f056f5a0524a2e85309b2f63ee99cd973f14aff5815585ee", 0xba, 0x10001, 0x0, 0x0, r5}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:20 executing program 0: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000140)="020400000300600000000000fff55b4202938207d9fb3780", 0x18, 0x0, 0x0, 0x0) 01:47:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x2, 0x40ff) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ptrace$cont(0x7, r5, 0x9, 0x7) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:20 executing program 0: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 01:47:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:21 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) clock_adjtime(0x7, &(0x7f0000000680)={0x0, 0x401, 0xde36, 0xe9, 0x8, 0x400, 0x10001, 0x1f, 0x8, 0x9, 0x2, 0x8, 0xa8b3, 0x80000001, 0x800, 0x8, 0x7ff, 0x3, 0xffffffffffffffe0, 0x800, 0xfffffffffffffffd, 0x7fff, 0x1ff, 0x4, 0x4}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) setsockopt(r4, 0x7, 0x5, &(0x7f00000005c0)="189bdfd07603ba8bf57da7ae53c23fd33fad10fdcf6f946986f52efb3f685cbe3d544fd049134babda92da5967b2f91cd7edd3eb5a069635788798e04d98c74087be562e31e242e0472f66d439115940331dce3fa83847c8edf6efa054f3fa5ff42bcc14916542bcd5a9275455fdb206f080ccc5d870631b12eab9a45300ea18bba30f2ffca19d95f93a2041b5efdd070cbfeb51d60f6131520df264b5bd8bbd49e470e66a3e8d58", 0xa8) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() r3 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r3, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r3, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r3) tkill(r2, 0x14) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 01:47:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000280)) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) sendto$inet6(r1, &(0x7f00000005c0)="42567c3a29af557b7c0af5f428f8a6770bdfa8e3277e872708dfb6d30d378bc0704ff5b3a4a9cec11a6ac3c3c1f6e0df725b554efd0e7ac572facfd1ed7dd92b85e12532b11285f39e6fdb93a54002033e7d0458a2e14b4e84fba50235c2a1fa02a9cb2e9bd045f336748d82d23638b4ce2e95356c40981c0e0b", 0x7a, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() r3 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r3, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r3, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r3) tkill(r2, 0x14) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 01:47:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000005c0)=""/221) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e24, 0x40000000000}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000700)='vegas\x00', 0x6) r3 = dup3(r0, r2, 0x801000080004) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000540)='./file0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000180)) 01:47:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() r3 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r3, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r3, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r3) tkill(r2, 0x14) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 01:47:22 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) fcntl$getown(r1, 0x9) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000140)='security.ima\x00', &(0x7f00000003c0)=@sha1={0x1, "1f726425baeca6f01a230e96ec4f4182a20a36c7"}, 0x15, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() r3 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r3, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r3, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r3) tkill(r2, 0x14) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 01:47:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') pwritev(r1, &(0x7f0000000a00)=[{&(0x7f00000003c0)="3c8207b5f2fb2d8c279d69dd99c967d8f0ea2e2f7f990c37f67ac6450cc2c5dd0ce765199a701d", 0x27}, {&(0x7f00000005c0)="831c8d10f500bf356cb614632f51e3639ad0bb542a209bb56763f26eaa119d55932d669849c0b3060859c1a30313a67af342b0284cb54a7c7b33c3c5ce7f6f8b08c43a03c25127e3f72f0c75a8f5e4ac18224a1d6debc222b69e9eadbfee41edee2a2b1696c833", 0x67}, {&(0x7f0000000640)="ad55f463dc356f92f263bc48be9abf6cbf0458262696e060eaf18db1016ee7f65d9461ea0478d53fef21416f2262269095f3adddd0762f0e70cfcd8abebd3a94fcfc6a6c318bdcc7435044429e5320ef3652cbbc9e5814318580c46d80117b8790d3d83af4ca5f6eebc0a594b26357e5330615cbde64a8f422a6758d3e17fab845687d342f1c24c6e87265b3587672cf9801f1054f56a672164a70dc6b156175170adf46f413", 0xa6}, {&(0x7f0000000540)="33a5c727f6956e8eef4b6523e85649f9333756e7837b07cd623518ea19d9e4a99a413adace58df151ad2275d553309977637cf110f9b10", 0x37}, {&(0x7f0000000700)="6ed1b9b98df4d533253fc0b08f6f20259e763931062e4966df5c519c635bbacc9998c25a888379c8d1486aed9037028db3658071f439937c72f470a87de4ecb3722d159fbd1fd36bd0087da810a6b210def5f96dfe3896984c4fca454d0f1c1bb5bd87493d45fb8f3edab370de3dcabd85d6f54e9dbd242fb79df3a11efeb1183db76d2a02ae5fab494ea5442c9a16c677aacf5d05afedc3e311b7bbfac67f549ac68466ddb6c4a07837094596888a5bb4a9bc9ef7fd202634e2", 0xba}, {&(0x7f00000007c0)="10311e0011a6cbaf8e4debaa7057691a2ae7e1f5d6a3f28e6159e1003ff87acc2f77103c636ce81e54da5b73d8ef396e02faef5cb553f773ae1073322508fdd7792252c8a1239b40cb5d5443b776283680412b5ad654d6479ee9d6f25aac76c4f29e720801100aed5b596a0194c4b48ed105cb69ee2bf0c120cd397bd751c4af333a16332e59c2221d8648c6ef70a46c42b26c22fe36d9d9c1e22593b300adb5864ea7f48a0d1cb81ba6815a6e0568e3fbce0a5ca3abb27553dbc3c3d5525a1d33312d9abb468740007a6cee525d60602256d83ed498ce14f33c11adb835", 0xde}, {&(0x7f00000008c0)="fc00caf07f0e4d26f05de545374751ee745d2510f692d6ad844e5e35719d4292f3f78d408583e2484163c58703dde231dcedbc5826d8503052ba6bbbebdff9ee0321d5bf3511dd4e06ee936396ddaed24542efa00c610bc4ca68998bd3a77ed6802f1e79da19dfe614c4cba897d896d96b28a11f4896b28b3b39c05919ec40415f871f6e57330e7a43b0fde9f01a05b43e0495f0585a032192af518410cb82f1071db583c810995b6208144a3031d9c90562738961625a9854555ad58b80c886", 0xc0}, {&(0x7f0000000980)="dcb7c4ceaff5076453648f1cd6abed1d2dbc144a018185ddac0a69c39dc767a21ffe3336ef1bad0c2dc3e39120c0e5931a2d3bc1d47ded615ffadb444d", 0x3d}, {&(0x7f00000009c0)="547456eee85f", 0x6}], 0x9, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000ac0)='trusted.overlay.opaque\x00', &(0x7f0000000b00)='y\x00', 0x2, 0x3) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 01:47:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/12, 0xc}, 0x1}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00\xc6\xa0\xea\xcd\x80\x80]\x99`\xba\x16k\x0f\"^\x84E\x13 V\t\x05)\x97\x12\xa8b!\x00m!\xb1\xa4\xb3\x12\xd5X\xd8=e*\x94\xea\x01\x03\x9ez+\xd9v\xfb\xaa\xcaJ^\n\rp\xf5\x18\xed\x826\"\x93\x0f\xa7\xe9\x18,_\x03\xc3Z\xc9\x97d\xc8\xc32\x0e3>e\xed\x02\xea\xddd^\x90\x02y\xac\xdc\xf8A\xef\x98\xc0\x8a\xb03~P\xfc`\xdd\x1e{U\x9e\xdc\xea\xdf\no\t\xe8\xba\b95\xcc\xc5\xeb\xb7MmD&\xf7\xc7\xadF\x91\xd8\"d\xf6\x91b\x82z\xfa\x80\xd2\xf9\x8a+\x8f\x89\xde\xdbR\xb2\xf2D\x81\xc7') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 01:47:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) symlink(&(0x7f0000000540)='./file0\x00', &(0x7f00000006c0)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r7, 0x10e, 0x5, &(0x7f00000003c0)=0x6, 0x4) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@rand_addr=0x7, 0x4e22, 0x0, 0x4e20, 0x4, 0xa, 0xa0, 0x80, 0x2d, r5, r6}, {0x3ff, 0x4, 0x40, 0x9c8, 0x517, 0x3, 0x1f, 0x6}, {0x8, 0x8000, 0x9, 0x10000}, 0x6, 0x6e6bba, 0x0, 0x0, 0x3, 0x1}, {{@in=@rand_addr=0x8, 0x4d6, 0x3f}, 0xa, @in6=@ipv4={[], [], @loopback}, 0x0, 0x1, 0x1, 0x4, 0x1, 0x1000, 0x1}}, 0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x0) 01:47:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x0, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:24 executing program 0: io_setup(0x101, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 01:47:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x40040, 0x0, 0x0) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x0, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:47:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000540)={'ip6tnl0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r4 = getpid() syz_open_procfs$namespace(r4, &(0x7f0000000140)='ns/mnt\x00') listen(r3, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) 01:47:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, &(0x7f0000000080)={0x9, 0x2, 0x0, 0xfffffffffffffffc, 0x10001, 0x4, 0x6, 0x7}, &(0x7f00000000c0), &(0x7f0000000180)={&(0x7f0000000140)={0x492a}, 0x8}) 01:47:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x4101) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x20810, r0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, &(0x7f00000001c0)="2caf93df99f5eb05c2f2df62e3a9968009bb737ef2022d6b9abe6ea0ad34", 0x1e, 0x40040, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) read(r1, &(0x7f00000003c0)=""/41, 0x29) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x32, {0x2, 0x4e20, @local}, 'veth1_to_team\x00'}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f0000000600)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x4e24, 0x2, 0x4e24, 0x7, 0xa, 0x20, 0x20}, {}, {0x0, 0x7fffffff}}, {{@in6=@local}, 0x0, @in6=@rand_addr="a972ea9522dbe7cc78d221fce9338098", 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0, 0x80000000}}, 0xe8) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x90400, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000580)=@req={0x0, 0x7d, 0x4, 0x7}, 0x10) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept4(r2, 0x0, 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 1002.587235] ------------[ cut here ]------------ [ 1002.592137] kernel BUG at net/core/skbuff.c:2208! [ 1002.597504] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1002.603388] Modules linked in: [ 1002.606723] CPU: 1 PID: 589 Comm: udevd Not tainted 4.4.174+ #4 [ 1002.612773] task: ffff8801d4b62f80 task.stack: ffff8801d4bd8000 [ 1002.618812] RIP: 0010:[] [] skb_copy_and_csum_bits+0x6e7/0x800 [ 1002.628128] RSP: 0018:ffff8801db7072b8 EFLAGS: 00010206 [ 1002.633557] RAX: ffff8801d4b62f80 RBX: 0000000000000000 RCX: 1ffff1003b2157a9 [ 1002.640814] RDX: 0000000000000100 RSI: ffffffff821f6ac7 RDI: ffff8801d90abd48 [ 1002.648081] RBP: ffff8801db707348 R08: 0000000000000000 R09: 0000000000000000 [ 1002.655344] R10: 000000000000003c R11: ffff88000019105f R12: 000000003fe31f16 [ 1002.662600] R13: ffff8800b3ecf8c0 R14: ffff8801d90abd40 R15: 000000000000003c [ 1002.669857] FS: 00007fa054e657a0(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 1002.678071] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1002.683934] CR2: 00007ffe3dec7f90 CR3: 00000001d4bb1000 CR4: 00000000001606b0 [ 1002.691188] Stack: [ 1002.693320] ffff8800b3ecf208 ffffffff8244588d ffffffff812582dd ffff880000190de8 [ 1002.701382] 0000003c8271bb16 ffffffff810e1a8a ffffffff8271b24e ffffffff8271a59d [ 1002.709393] ffff8800b3ecf204 ffffffff8148475f 000001e83fe31f16 ffff8800b3ecf140 [ 1002.717453] Call Trace: [ 1002.720019] [ 1002.722077] [] ? tcp_write_timer+0xbd/0xd0 [ 1002.728239] [] ? call_timer_fn+0x18d/0x850 [ 1002.734124] [] ? irq_exit+0x10a/0x150 [ 1002.739560] [] ? smp_apic_timer_interrupt+0x7e/0xb0 [ 1002.746212] [] ? apic_timer_interrupt+0x9d/0xb0 [ 1002.752519] [] ? kasan_slab_alloc+0xf/0x20 [ 1002.758404] [] icmp_glue_bits+0x7f/0x1e0 [ 1002.764104] [] __ip_append_data.isra.0+0x1e91/0x2a20 [ 1002.770852] [] ? __ip_route_output_key_hash+0x1025/0x2080 [ 1002.778046] [] ? icmp_push_reply+0x510/0x510 [ 1002.784095] [] ? kasan_unpoison_shadow+0x35/0x50 [ 1002.790485] [] ? kasan_kmalloc+0xb7/0xd0 [ 1002.796185] [] ? ip_generic_getfrag+0x210/0x210 [ 1002.802492] [] ? ipv4_mtu+0x208/0x2c0 [ 1002.807946] [] ? ip_setup_cork+0x41b/0x690 [ 1002.813818] [] ? icmp_push_reply+0x510/0x510 [ 1002.819859] [] ip_append_data.part.0+0xec/0x160 [ 1002.826165] [] ? icmp_push_reply+0x510/0x510 [ 1002.832217] [] ip_append_data+0x69/0x90 [ 1002.837827] [] icmp_push_reply+0x199/0x510 [ 1002.843692] [] icmp_send+0xaca/0x1410 [ 1002.849144] [] ? icmpv4_xrlim_allow.isra.0+0x2d0/0x2d0 [ 1002.856053] [] ? iptable_nat_ipv4_fn+0x40/0x40 [ 1002.862268] [] ? check_preemption_disabled+0x3c/0x200 [ 1002.869091] [] ? check_preemption_disabled+0x3c/0x200 [ 1002.875911] [] ip_fragment.constprop.0+0x1b4/0x200 [ 1002.882470] [] ip_finish_output+0x3b9/0xc60 [ 1002.888426] [] ip_output+0x227/0x4c0 [ 1002.893770] [] ? ip_mc_output+0xae0/0xae0 [ 1002.899561] [] ? ip_fragment.constprop.0+0x200/0x200 [ 1002.906318] [] ip_local_out+0x9c/0x180 [ 1002.911836] [] ip_queue_xmit+0x89c/0x1ab0 [ 1002.917627] [] ? ip_queue_xmit+0x3f/0x1ab0 [ 1002.923511] [] ? __skb_clone+0x254/0x760 [ 1002.929212] [] ? __tcp_v4_send_check+0x1c5/0x360 [ 1002.935600] [] __tcp_transmit_skb+0x1904/0x2cf0 [ 1002.941923] [] ? skb_split+0x774/0xfa0 [ 1002.947442] [] ? bictcp_init+0x590/0x590 [ 1002.953143] [] ? __tcp_select_window+0x520/0x520 [ 1002.959541] [] ? tcp_fragment+0xc04/0x1060 [ 1002.965423] [] __tcp_retransmit_skb+0x5ea/0x1710 [ 1002.971816] [] ? bictcp_cwnd_event+0x120/0x120 [ 1002.978030] [] ? tcp_enter_loss+0xb6c/0x1050 01:47:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, &(0x7f0000000080)={0x9, 0x2, 0x0, 0xfffffffffffffffc, 0x10001, 0x4, 0x6, 0x7}, &(0x7f00000000c0), &(0x7f0000000180)={&(0x7f0000000140)={0x492a}, 0x8}) 01:47:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, &(0x7f0000000080)={0x9, 0x2, 0x0, 0xfffffffffffffffc, 0x10001, 0x4, 0x6, 0x7}, &(0x7f00000000c0), &(0x7f0000000180)={&(0x7f0000000140)={0x492a}, 0x8}) 01:47:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, &(0x7f0000000080)={0x9, 0x2, 0x0, 0xfffffffffffffffc, 0x10001, 0x4, 0x6, 0x7}, &(0x7f00000000c0), &(0x7f0000000180)={&(0x7f0000000140)={0x492a}, 0x8}) 01:47:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") [ 1002.984075] [] tcp_retransmit_skb+0x23/0x2c0 [ 1002.990115] [] tcp_retransmit_timer+0x7ee/0x1f70 [ 1002.996504] [] ? tcp_write_timer+0x21/0xd0 [ 1003.002389] [] tcp_write_timer_handler+0x3bc/0x700 [ 1003.008953] [] tcp_write_timer+0xbd/0xd0 [ 1003.014650] [] call_timer_fn+0x18d/0x850 [ 1003.020341] [] ? call_timer_fn+0xde/0x850 [ 1003.026134] [] ? debug_object_activate+0x470/0x470 [ 1003.032696] [] ? tcp_write_timer_handler+0x700/0x700 [ 1003.039434] [] ? process_timeout+0x20/0x20 [ 1003.045319] [] ? _raw_spin_unlock_irq+0x28/0x60 [ 1003.051634] [] ? trace_hardirqs_on_caller+0x260/0x5a0 [ 1003.058500] [] ? tcp_write_timer_handler+0x700/0x700 [ 1003.065241] [] ? tcp_write_timer_handler+0x700/0x700 [ 1003.071982] [] run_timer_softirq+0x51f/0xb70 [ 1003.078049] [] ? call_timer_fn+0x850/0x850 [ 1003.083925] [] __do_softirq+0x226/0xa3f [ 1003.089541] [] irq_exit+0x10a/0x150 [ 1003.094810] [] smp_apic_timer_interrupt+0x7e/0xb0 [ 1003.101288] [] apic_timer_interrupt+0x9d/0xb0 [ 1003.107413] [ 1003.109462] [] ? memset_erms+0xb/0x10 [ 1003.115209] [] ? kasan_unpoison_shadow+0x35/0x50 [ 1003.121600] [] kasan_kmalloc+0x4c/0xd0 [ 1003.127123] [] ? avc_alloc_node+0x27/0x3c0 [ 1003.133015] [] kasan_slab_alloc+0xf/0x20 [ 1003.138713] [] kmem_cache_alloc+0xdc/0x2c0 [ 1003.144586] [] avc_alloc_node+0x27/0x3c0 [ 1003.150286] [] avc_compute_av+0x182/0x610 [ 1003.156077] [] ? avc_compute_av+0xac/0x610 [ 1003.161955] [] avc_has_perm_noaudit+0x2a8/0x300 [ 1003.168269] [] ? avc_has_perm_noaudit+0x9e/0x300 [ 1003.174673] [] ? avc_has_extended_perms+0xd30/0xd30 [ 1003.181344] [] ? walk_component+0xdc/0x1000 [ 1003.187307] [] selinux_inode_permission+0x27f/0x4a0 [ 1003.193959] [] ? audit_inode_permission+0x320/0x320 [ 1003.200631] [] ? walk_component+0x58a/0x1000 [ 1003.206677] [] security_inode_permission+0xb9/0x100 [ 1003.213324] [] __inode_permission2+0x96/0x250 [ 1003.219450] [] inode_permission2+0x32/0x110 [ 1003.225405] [] link_path_walk+0x198/0x15e0 [ 1003.231286] [] ? walk_component+0x1000/0x1000 [ 1003.237427] [] path_lookupat.isra.0+0x6a/0x3f0 [ 1003.243648] [] filename_lookup+0x1a4/0x3b0 [ 1003.249516] [] ? filename_parentat.isra.0+0x3e0/0x3e0 [ 1003.256355] [] ? __check_object_size+0x222/0x332 [ 1003.262762] [] ? strncpy_from_user+0x18e/0x230 [ 1003.268983] [] ? getname_flags+0x232/0x550 [ 1003.274857] [] user_path_at_empty+0x43/0x50 [ 1003.280819] [] vfs_fstatat+0xc6/0x170 [ 1003.286258] [] ? vfs_fstat+0x70/0x70 [ 1003.291610] [] ? path_put+0x50/0x70 [ 1003.296878] [] ? do_utimes+0x1ba/0x2c0 [ 1003.302415] [] SyS_newlstat+0x97/0x110 [ 1003.307941] [] ? SyS_newstat+0x100/0x100 [ 1003.313640] [] ? SyS_utimensat+0xde/0x150 [ 1003.319435] [] ? SyS_utime+0x150/0x150 [ 1003.324961] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 1003.331442] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 1003.338012] Code: ff ff e8 4d 2b 11 ff be 8e 08 00 00 48 c7 c7 e0 25 a5 82 e8 cc cf ed fe e9 48 fe ff ff 44 8b 7d d4 e9 c4 fd ff ff e8 29 2b 11 ff <0f> 0b 4c 89 f7 e8 8f e3 28 ff e9 b2 fa ff ff 48 89 55 b8 e8 c1 [ 1003.365787] RIP [] skb_copy_and_csum_bits+0x6e7/0x800 [ 1003.372769] RSP [ 1003.376440] ---[ end trace a21ba990ba6cf7ef ]--- [ 1003.381201] Kernel panic - not syncing: Fatal exception in interrupt [ 1003.388005] Kernel Offset: disabled [ 1003.391635] Rebooting in 86400 seconds..