32825] audit: type=1400 audit(1569846823.642:10919): avc:  denied  { map } for  pid=20686 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  690.460196] audit: type=1400 audit(1569846823.642:10920): avc:  denied  { map } for  pid=20686 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  690.589313] audit: type=1400 audit(1569846823.642:10921): avc:  denied  { map } for  pid=20686 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:33:46 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r66=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r67=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r68=>0x0})
getresgid(&(0x7f0000000c00)=<r69=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400))
r71 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r71, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r70, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)

12:33:46 executing program 5:
ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0)
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0)

12:33:46 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="b8112eb734cc407da0591d31e503e190", 0x10)

12:33:46 executing program 2:
open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0)
acct(&(0x7f0000000000)='./file0\x00')

12:33:46 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d56", 0x69, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:46 executing program 4:
r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8581, 0xbb2fdd7cd9b9a34d)
ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1)

12:33:46 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d56", 0x69, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:46 executing program 1:
r0 = socket$nl_crypto(0x10, 0x3, 0x15)
fcntl$getflags(r0, 0x1)

12:33:46 executing program 5:

12:33:46 executing program 4:
syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0)
r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4800, 0x0)
ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000000c0)="307cca6aaf0f8600a8469a60ac748b1882171a3da610fd2c136e3e63d3b37109def68a51aa616218969a536e77e47f7b4849c12dcab3a64a37a99dd72c295a6d820d70d755d6617b60a7c5d0df3c4d87845e29f50a017a6b9f081a981eb0b011e67570235cabcbcf1f101f97b9b4d7dd681657b72a690bdb40ccda0f5cd482f59cc3caf7edc32f478af611b3577399d3a51de9674ad5ad10d79adc27bacce03d6879375b335b4bb72f2708a2d5857471b37416a3fca1d6c5447906f37ac4d192a22e56447e81b49c11f1aacdbe267f6ebecb465126e681d6db3584edaa279bc0a09680e61a0aca639469cb8cd55e82eb4c241d2470bd55de8a343e7adca187d92a5b78c7b256537e9477d4ce11502c2638bee037e7d434f82820db788aefde7f871fa6bdf7e671ddf5755877af7be1bf050c0ee2fb70c352c62d148185bd329f32b14eb7999774988daacb48430f289ccb040194daf1469e57549e5ff552effa0ed0effe80fd0ec766a91d7bf6662617fed90b98fb9e43208c19f7fb6dd2ab3afda004a2bd0f24563e44e02080d5c0106154ed3d28881901c00d6dd19bbd03141ea5ac16e94bd836b81eb24ff8e5e88d65cc6ebeb9d1dc53d5827378cfec4d0d7bf7d2003b7bc2921d0983d130d319815f3b681a73272883d668456986cf3f72e33e507d8bcdd491b720b912e1e76daf4d0a295b1c0ecc6439adac010263428108cb91aaa545d40999b885c607f9849489d72746e09c33b710ebc10df922102f161cc272ca795a1701b63642c905a67dd145fedc86ce5b0022f87ecd2b2b9096d62f95c813841bab15da75903f5c599feb633b9390387bbfc034f68c0d1e895819966fb1a360f2eee5f1b44ad4816b7112280d950f7e2a2235a50cf02f6770050d892ab6f95eb7dabae0876fe0ec4ef383bfcece56645a5b00dc1c0d49db42421dd12c42138a047aa986de4d0ee9448873479ab61764b6783ed2b7d1ffa8f6cf02d6f0cb6984a0fb63f4192d2da6c9b623d2affd6a4757025ff718dfa5b3c9b5442a3256dea36eb379e81b9cdc20a2e58fcca69b5339deac2b934873dfc124d62984665cb767c5fc8b4250828677d4f6f51f6e8e4c7b0b18829facff8ad98b27c3e01ba6c8953845a8bab880337991cefb5c6ee8584b50364d86a3e06964c54713522c19e75032f069ed85542bae17dcbbf45305866962a6df54545131c63684fb632aedeae4b70f36940308dc3944c216facd5685d8581a0ec16a3f39b201f390b8e6057b805b1f978d1dbb6c112775121c6b2527bdb07d07ce610d2c138c80a5d1766866cbfce706cc255f1c71780d471e6606345a285bcf47e5d49ffde3535862451bb3262b1c215c4ead3726c0f4a80e6eec69ada42d155bf087ffd8e1c75628756d0d8e9d9647401798b466c32a0a31675bdef8a52fc1e7b9b65adf34c18b3be290e62c7096cadee24058c74f89a298431f2e93ba9b7effba1f6ed48450eec81fa90a0e0e28210671ddd3a45aeb632bfb8fcef1180fadee233f4f73eb740d4cdaf9b62ddd0756069884c7d71412523dae4827b3b46b9d15ee87b86e2f1fa84d9ef84b5a72fc5e651a5c4bb65bbf5c23aa0b8a1e9bc7faf8a2fc2bec695aded96c98d0e0f05ad045033344e02fd3388f946cd4d6817e18165b48e7fca7fda4a7e57faa4369c5577d5fa06a86b377e3e16507a1e18abd1cfd58327da6ca91a4b6cf0a6726480d4d8392ba550a6ff57b66f7549ade4860c22e4c7e15a72bce7dd3c5684a20875e0d9ccad1744dcb648625f7cbd167ea9e72634d6174f7a8e1fc37747be5e2724eb59f34c8a09f67a70826f1faf49ca4ae6982afe2e94f97515f9263aca3ce8f1e8f982ce7c6388aa8229ec589f062116d1f3ae516909c599e169681d9333ca492f7c88b005ff2597a41b3e72e3394d9099b9f7a7846ecae3d97b89965b0edb040adee9775fe8d65253f16dcea745673f59c0b64a536d7dd1ea078c972a0c2634481b379d676bcbb64b74dc2c4e320163de073266d970928432564a97cbd06c7ea6b9d6b86f6ffd963f1f8ad6ce80de94919accf9067a00aafda0ece4feb58f1c1521f05356bc268e18b720d55e2c04057cfb7c3cc6c56fd00ae626b72d5f5fee0eedfeab88f3c1d3eebe9f9ec26fa9e8f2d6faaf6e400ce7136fd8d5d96ce4ff06b97c26ad2ec05f0ff623ea8d50e3d41959b74d3c683f2c0094e41a52120b9c60bb82fe708aa434060cd7fcc5947fca47a80202bbfa7ffe0d0980bd3188ef858ad37d39a7d54c764d07df260d2d86c6579b17fe5df94b3e4b62444cd5aa32ba4e77edfd340957551d5dad8c8f96a882e40670d064983dd54ed5fc0e6f9827f95fb0de8384990c341499b089864b9d21033a5f2c84a6231c8b1924778f2c1286d4479f8ee45ab1c7b80d4add030727265005a2523f5261f81b190f0f8c75b0948ae34081b46c26067d28519586d871fecbaf41c3022d51d47baf70add36d21a119cd2ea08ad9c29369043cf4049577316f74927d1b5373ac2e5d169a42f8fc0f50d8c10147d9877b2529b042f3f218b6bedc4c940109d7da9a6cf6da5cf1e1c8bc52855c9de35796e2601a3db8469807cf45736458e3478c1132535c9ece0a60941445294798b0c8506c863dd3a022d6abcfb9847922535c39b44f8d84344262105ad7a2085473bbb0aa81e386afe5294269760c922d7e7d5e438867b97888918c76c4fd43ed32c00f2b3e9b1480bef9ecfe12479d4a32fd9d7cb753bd5084bcad9bea551baa3dd727c99c07a0dcbcac30cbef23fdaf4e9b3341a3a5dbde0b31f5398cf23b05b4b5e988d7b654f3a50a65313d93ff224e100df9cf8ba1bd0cca19f33ca93eddd3ad4947cbceefe4d10fb85c3408212d6e04f9b39bf8d471141dfb462d01ed18e9b2cba933d51b119d9daa2dd1d77b5874752c021ebf08730e2dd8bf3f93502797e081bb3254f651075eb4289f5c120dc3627d1927479d1824a6f5bde10c681ac7264ab0d125cc38a70d378eb3b369447fd42839325f9ab89f298027e666b3397163526d9edcee68186bcbd798040a47707450a4c4d3f5924c55d4c567e6873661748a36305e0c3932c0398e7980f7b3db4fd98fd86014041649dd5a27ca1cd9c070056c92b4713416ec57c58a485e66d889396c0671a1d3870b142ec9132d55045be8e0ce233c8460ef387619e18a78daf39bd597474e7cecf4cb33c4b22cfb6652b9ce7345c73eee1ff4691fc14f51ea6eb66dbf5aeaf26bb54757eb1862e2e516023490aef00b9764239d986c644f00f4cbcab8c04adbb61880eabf8633a15ef19d8d97a5978a71c9dd1a8231b0a20c1390026915b227f2111be2c91a25e4913c76ba1d2bed0459941b883b0c5febc6e583514b141eb84807d608800b8ce0cf94fde88c2641b36f5e05ccbbf7608b141bc04937fbcec020c4be412425f761de62d47ad28d1a9daa0b9b5839b0d9cec282a6ed82cf2c1699c6e48ea7b119a87c3bac5fbdac1036dac20996eea0ec7025fa2454fa16f8c3a637472f67829cc2129933bb5f9d1196fcd9648a2b5b409bc2529f7148779bb525ed65fd635ddecd38da1eca60abd7fd76d9e2dd8b520c5ff8f3cf611220965bfb9babeece3b6b8d29123842756027a79eac71267bd8c7a17e2867b5ea7c8cfb3d9cada09fd3721904ea8da3710db3ffd61b59be7eaeb871b16ceb5d093962a4549bbd09c3b10f844f555b5bd148fa8327ba7d5ffafa3793e99af002a2e1acf12254da489a1815499e829eb7365625bc55e235a7d00b540165fba71c9784a94fd1380d35600c2f087ba5d702ae3e4cc61ee4ed4d9d4623bad45b7bfbb27fa54f449fb98c54a1db90e51d3378035f07d313d15598421105998ca464eeaf5854af606ae9fffd91ea6dd37857c321e88f012f620edf3371ca0d46734df89f553f6decd19edc70a291b2005c88cfcf54a0de855f7bdf8e5b11aa0d0259f73a74afee3754341a97a82bcccffe6062259364ad38435126271c924406528e4eb41733bea2b2cb4a49992dcbfd670925e916f0edea6602b7921a4c4d0c90c014eacf8aa0e4915f1e709b9a1ed46b2b6e92c07840b448f4dccb1302f9f2f5b31ab6bc3b66386f0258685ddd2cb9fbdf80b192ed446545e272b4fe67164e6a4d57778121dbc4d6cce53e13bca2f2f3794eb23f1f2b19be528f7710be2b1c0ba8301860564ee73ac7b667c32ac4e74b0589279f740ee36027f498b48da286686e7e9c22074fdaf9d9d5a3df01c53e8a8ce114e10bc40d7637a5e76e2cfe79a3c19fbef0a8afc5ddb323052ad3a8602aee1085b9f2d9698829d89d4a715434b73a1b8eeb6b4a9569ee238098038de5b95217934abb8aa040eb12cb841851c6f4435a791e570ae47f72c8b8b3eeb4dd3a1deddbd5be3088174cf6a59a34f02e8ce8519d84cc26db4063761560e785272b6b30c0b2ccf18ad77eea707cfb931293dc4d9f392c73dc5037c31836902c0c2b48288ade63ca12b9957e21300f5b4511b1b9fd3e9e1ad102f6724627176c00cc0dce653b7107f72e853b83f6856e1fee50727824d363b6d6c8163086a4fd707757797912f38df9549ab2a09f57145fd75db86ad4909653bdb8b21cae0e2c25252fa4d4b1de6d2210a1b9e0f7e067b0d5972475be30ecfc1abb97b20666989450b66fce0bb6c794a32b407938e5a803ec2690903af9376923147e7a78db6661683f4d6a86be8f1beb022044862190225a97f16ff7fa2bf59a30e8b4a5f1fbca2ec77533081f766ce35ea63a82c135381b32ad331b33ab0226e3bda9374c455cb74ca7a64e535176471fe1d1271ae4878112a5a570910445bef21682ac49bb8172f5f1d0f3e654c73d865eefba7aa68e9a69fc4fce9d068cde03ef175f0c0cc25e379ac0fe2c8880e3ba889c9274140cd0e0f88defec55a9563d05d72e0559d93b4ce342f07587bcbba39339437097f333921e35a4793bed0bacf3108dcc01002f680f5b5818f5ec36306db073c44c96727ca736069da333fef5dfcd9daae36b3a14595394d94a9b5e9a22a8603172944c80ced0144aae025c59831393fdccf319655e300439dc978117ad33081b61dedfd6cb7f71d69978e5c0a60f465b501abf3bbce26bbbf7922d301846d1947b9f8bbe7665eba7e554101653d11e2b3150163bc85735e49d232bff80f81a9b70fc86c2db931188f8bb646aa089e4b4f0add998a5f060fb414530d1bdaaaafe00bfc4cd7f10280ecad439f63f12ce7f57e09c7845c1fe0f152dc9c4a9794c4f2a89aaafd52f9d14f7c8f469dfe97417ab3f6801a1ab4ae1673d2830bd72c2b117fdb578dc2c6f6451d7e47ecbc9d96f8cc33b6c1cfca97e9be58289ce331fe90112b1e9554df962f9f8d2b88684c7efd518a430d1d2a70e84c1c93a89c6530bbac1bbac9c7e26f890115364daa95d5db1f9fbc5f9e1c39243f29d1f0a226aa85da440c1d022d0aa8d9a5043245b31344086fe84ab8d4ddef8aa1aafa1adefbe1c35a1e3b16b2348b8025db4f22ead6a38cc55fb7c822cb34c888f609f9cb6b63f1d76b6dbf3506d4db047aa79f9d3810cd93bd43d62519094e3cd84af26bb74e74b35db08adea8ce0eb761996539c96b83f773a00773fae7bbe32e030c1e3f3a7732339bb5105a9013c11876de0b5819bd1d652461382ee9b4ee8d63af70468af2c421db7124c5f37262f3eb359cc8e429af3b759d002c42b8f5e435e86448fee172d27bbdb89b00b69f961911d3f1cab6f5a5caa536a71f3ddb36b552908ebeca5f99")

12:33:46 executing program 2:

[  692.861891] Process accounting resumed
12:33:47 executing program 5:

12:33:49 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r66=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r67=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r68=>0x0})
getresgid(&(0x7f0000000c00)=<r69=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400))
r71 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r71, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)

12:33:49 executing program 5:

12:33:49 executing program 1:

12:33:49 executing program 2:

12:33:49 executing program 4:
syz_emit_ethernet(0x7b, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x11, 0x4, 0x1, 0x2c, 0x6d, 0x65, 0x0, 0x9, 0x27, 0x0, @multicast1, @multicast2, {[@cipso={0x86, 0x2d, 0xffffffff, [{0x0, 0xb, "4ded7e4ed7215355fe"}, {0x5, 0xa, "98ab47393f5821b8"}, {0x0, 0xd, "22f1e2b9e6067e8083643e"}, {0x0, 0x5, "bc496b"}]}]}}, @igmp={0x12, 0x3f, 0x0, @multicast1, "af102f7affa6d4f48c3194649fb3746447de406ac706d52602ffe754d24cb90ccc"}}}}}, 0x0)

12:33:49 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d56", 0x69, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:49 executing program 1:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2(0x0, 0x0)
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95})
openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
mkdir(&(0x7f0000000500)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000000c0))
mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/5)
lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740))
socketpair(0x1e, 0x0, 0x0, 0x0)
openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, <r1=>0xffffffffffffffff})
openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, r1, 0x0)

12:33:49 executing program 2:
syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@fat=@nfs='nfs'}]})
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)

12:33:49 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ffffffff000000006000000000000000e000000200000000000000000000000000000000000000000a003f8000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/112], 0xb8}}, 0x0)

12:33:49 executing program 4:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2(0x0, 0x0)
openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0)
openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
mkdir(&(0x7f0000000500)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000000c0))
mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1)
write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x0)
close(r0)
sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20104}, 0x20)
dup2(r0, 0xffffffffffffffff)
lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740))
socketpair(0x1e, 0x0, 0x0, 0x0)
openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, <r1=>0xffffffffffffffff})
openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, r1, 0x0)

12:33:49 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f6", 0x6c, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

[  695.936994] kauditd_printk_skb: 87 callbacks suppressed
[  695.937003] audit: type=1400 audit(1569846829.872:11009): avc:  denied  { map } for  pid=20763 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=78866 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  696.051327] audit: type=1400 audit(1569846829.902:11010): avc:  denied  { map } for  pid=20766 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:33:50 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)

[  696.244517] audit: type=1400 audit(1569846829.912:11011): avc:  denied  { map } for  pid=20766 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  696.452552] audit: type=1400 audit(1569846829.962:11012): avc:  denied  { map } for  pid=20766 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  696.489331] overlayfs: failed to resolve 'file0���': -2
[  696.604580] FAT-fs (loop2): bogus number of reserved sectors
[  696.642982] overlayfs: failed to resolve 'file0���': -2
[  696.653791] audit: type=1400 audit(1569846830.002:11013): avc:  denied  { map } for  pid=20766 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  696.670252] FAT-fs (loop2): Can't find a valid FAT filesystem
[  696.830238] audit: type=1400 audit(1569846830.022:11014): avc:  denied  { map } for  pid=20766 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  696.857347] FAT-fs (loop2): bogus number of reserved sectors
[  696.940074] FAT-fs (loop2): Can't find a valid FAT filesystem
[  696.951061] audit: type=1400 audit(1569846830.032:11015): avc:  denied  { map } for  pid=20764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  697.038161] audit: type=1400 audit(1569846830.032:11016): avc:  denied  { map } for  pid=20764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  697.060905] audit: type=1400 audit(1569846830.042:11017): avc:  denied  { map } for  pid=20764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  697.097493] audit: type=1400 audit(1569846830.062:11018): avc:  denied  { map } for  pid=20764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:33:52 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r66=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r67=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r68=>0x0})
getresgid(&(0x7f0000000c00)=<r69=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)

12:33:52 executing program 4:
r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x46000)
r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r3=>0x0)
io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}])
fallocate(r1, 0x4000000000000010, 0x0, 0x7fff)
r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0)
sendfile(r0, r4, 0x0, 0x8400fffffffa)

12:33:52 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}})

12:33:52 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
faccessat(0xffffffffffffffff, 0x0, 0x10, 0x0)

12:33:52 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f6", 0x6c, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:52 executing program 2:
r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x14)
getsockname(r0, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80)
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f})
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write(r2, &(0x7f0000000600)="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", 0x200)
sendfile(r2, r3, 0x0, 0x7fffffa7)

12:33:52 executing program 5:
r0 = socket(0xa, 0x801, 0x0)
r1 = socket(0x100000000011, 0x2, 0x0)
bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, <r2=>0x0}, &(0x7f00000001c0)=0x14)
ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@mcast2, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r2})

12:33:52 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f6", 0x6c, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:52 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0)

12:33:53 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@cred={{0x1c}}], 0x20}, 0x0)

12:33:53 executing program 1:

12:33:53 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e9", 0x6e, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:55 executing program 1:

12:33:55 executing program 5:

12:33:55 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e9", 0x6e, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:55 executing program 2:
r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x14)
getsockname(r0, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80)
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f})
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write(r2, &(0x7f0000000600)="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", 0x200)
sendfile(r2, r3, 0x0, 0x7fffffa7)

12:33:55 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r66=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r67=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r68=>0x0})
getresgid(&(0x7f0000000c00)=<r69=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400))

12:33:55 executing program 4:

12:33:55 executing program 5:

12:33:55 executing program 4:

12:33:55 executing program 1:
r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0)
write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78)
dup3(r1, r0, 0x0)
finit_module(r1, 0x0, 0x0)

12:33:55 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e9", 0x6e, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

[  702.060925] kauditd_printk_skb: 161 callbacks suppressed
[  702.060933] audit: type=1400 audit(1569846836.002:11180): avc:  denied  { map } for  pid=20853 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:33:56 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r4 = inotify_init1(0x0)
fcntl$setown(r4, 0x8, 0xffffffffffffffff)
fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, <r5=>0x0})
rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

[  702.309464] audit: type=1400 audit(1569846836.002:11181): avc:  denied  { map } for  pid=20853 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:33:56 executing program 4:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x200000000000011, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', <r1=>0x0})
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14)
sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0)

12:33:56 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:56 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x81, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8)
setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000040)=0x6, 0x4)
r3 = accept4(r1, 0x0, &(0x7f0000000300), 0x800)
setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000340)={0xfff, {{0x2, 0x4e24, @rand_addr=0x401}}}, 0x88)
openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x881, 0x0)
mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
unlink(&(0x7f0000000000)='./file0\x00')

[  702.517083] audit: type=1400 audit(1569846836.002:11182): avc:  denied  { map } for  pid=20853 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  702.589907] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20868]
[  702.689632] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20868]
[  702.811063] audit: type=1400 audit(1569846836.002:11183): avc:  denied  { map } for  pid=20853 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:33:56 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r4 = inotify_init1(0x0)
fcntl$setown(r4, 0x8, 0xffffffffffffffff)
fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, <r5=>0x0})
rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:33:56 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket(0x10, 0x3, 0x0)
fremovexattr(r3, 0x0)

[  702.971467] audit: type=1800 audit(1569846836.032:11184): pid=20854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16737 res=0
[  703.119992] audit: type=1400 audit(1569846836.042:11185): avc:  denied  { map } for  pid=20853 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  703.208050] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20882]
[  703.294286] audit: type=1804 audit(1569846836.042:11186): pid=20854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir566391355/syzkaller.BCGOhD/8/file0/file0" dev="sda1" ino=16737 res=1
[  703.425967] audit: audit_backlog=65 > audit_backlog_limit=64
[  703.433391] audit: type=1400 audit(1569846836.062:11187): avc:  denied  { map } for  pid=20853 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  703.464516] audit: audit_lost=1022 audit_rate_limit=0 audit_backlog_limit=64
12:33:58 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r66=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r67=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r68=>0x0})
getresgid(&(0x7f0000000c00)=<r69=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)

12:33:58 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:58 executing program 2:
syz_emit_ethernet(0x92, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '_V\f', 0x5c, 0x0, 0x0, @dev, @local, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@ipv4={[], [], @broadcast}]}], @gre}}}}}, 0x0)

12:33:58 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r4 = inotify_init1(0x0)
fcntl$setown(r4, 0x8, 0xffffffffffffffff)
fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, <r5=>0x0})
rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:33:58 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x81, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8)
setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000040)=0x6, 0x4)
r3 = accept4(r1, 0x0, &(0x7f0000000300), 0x800)
setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000340)={0xfff, {{0x2, 0x4e24, @rand_addr=0x401}}}, 0x88)
openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x881, 0x0)
mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
unlink(&(0x7f0000000000)='./file0\x00')

12:33:58 executing program 4:

12:33:59 executing program 4:

[  705.053873] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20898]
12:33:59 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r4 = inotify_init1(0x0)
fcntl$setown(r4, 0x8, 0xffffffffffffffff)
fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, <r5=>0x0})
rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:33:59 executing program 2:

12:33:59 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0)

12:33:59 executing program 4:

[  705.417641] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20911]
12:33:59 executing program 2:

12:34:02 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', 0x0, &(0x7f0000000480)='vfat\x00', r0)

12:34:02 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r4 = inotify_init1(0x0)
fcntl$setown(r4, 0x8, 0xffffffffffffffff)
fcntl$getownex(r4, 0x10, &(0x7f0000000140))

12:34:02 executing program 4:

12:34:02 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
creat(&(0x7f00000000c0)='./file1\x00', 0x0)
utimes(&(0x7f0000000100)='./file1\x00', 0x0)

12:34:02 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r66=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r67=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r68=>0x0})
getresgid(&(0x7f0000000c00)=<r69=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)

12:34:02 executing program 1:
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080))

12:34:02 executing program 4:
r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaa0000000000000000000000000000000000009d52000002000002fb020000000000018820907800c2040060b680fa0000000000000000000000000000ffffffffffac30000000000000000000ffffac14ffbb0000000000000000000066d878317bd3eb00c78626812b4491d69cc93a91535ed54c1c8e151b6b2fa749d51bcdf10d6d53ee63979a3feb144afa3ba796d1a28d2a9047fc49e7f3cad2b26bb121d6125b59ad393c6dccbf0770c330f785fec51e768e3a8005da95d2080a7aba3760350bc00d5b00d56bb0159b1070b92dbf2062bc3a960b4e7aa2d2ab7ab49b385c3715b142113b84b3b97563c2450ee9386a97097718c7748425f03fd40107541272dd63d324470ce3a75ac1714ed590f3db6565124fa38bec41bf3ea2c1871519e4d141f67f80fec7e7040fff7f00000000000058c338b147aa0d4c1272c4328298c2d73aa8a1048667300d776a7d51811627756e00ee8f2f4ebfedf7be"], 0x0)
socket$alg(0x26, 0x5, 0x0)
mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10)
r3 = dup2(r2, r2)
write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0)
ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1")
madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1)
write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0)
r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0)
write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18)
r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380))
pipe(&(0x7f00000001c0)={<r7=>0xffffffffffffffff})
fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6})

[  708.146036] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20926]
12:34:02 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', 0x0, &(0x7f0000000480)='vfat\x00', r0)

12:34:02 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r4 = inotify_init1(0x0)
fcntl$setown(r4, 0x8, 0xffffffffffffffff)

12:34:02 executing program 2:
r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380))

12:34:02 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)

[  708.306119] kauditd_printk_skb: 117 callbacks suppressed
[  708.306128] audit: type=1400 audit(1569846842.242:11304): avc:  denied  { map } for  pid=20930 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79103 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  708.474488] audit: type=1400 audit(1569846842.302:11305): avc:  denied  { map } for  pid=20934 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:02 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)

12:34:02 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', 0x0, &(0x7f0000000480)='vfat\x00', r0)

[  708.523776] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20943]
12:34:02 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
inotify_init1(0x0)

[  708.662440] audit: type=1400 audit(1569846842.302:11306): avc:  denied  { map } for  pid=20934 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  708.779743] audit: type=1400 audit(1569846842.312:11307): avc:  denied  { map } for  pid=20934 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  708.882495] audit: type=1400 audit(1569846842.312:11308): avc:  denied  { map } for  pid=20934 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:02 executing program 2:

12:34:02 executing program 4:
r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaa0000000000000000000000000000000000009d52000002000002fb020000000000018820907800c2040060b680fa0000000000000000000000000000ffffffffffac30000000000000000000ffffac14ffbb0000000000000000000066d878317bd3eb00c78626812b4491d69cc93a91535ed54c1c8e151b6b2fa749d51bcdf10d6d53ee63979a3feb144afa3ba796d1a28d2a9047fc49e7f3cad2b26bb121d6125b59ad393c6dccbf0770c330f785fec51e768e3a8005da95d2080a7aba3760350bc00d5b00d56bb0159b1070b92dbf2062bc3a960b4e7aa2d2ab7ab49b385c3715b142113b84b3b97563c2450ee9386a97097718c7748425f03fd40107541272dd63d324470ce3a75ac1714ed590f3db6565124fa38bec41bf3ea2c1871519e4d141f67f80fec7e7040fff7f00000000000058c338b147aa0d4c1272c4328298c2d73aa8a1048667300d776a7d51811627756e00ee8f2f4ebfedf7be"], 0x0)
socket$alg(0x26, 0x5, 0x0)
mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10)
r3 = dup2(r2, r2)
write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0)
ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1")
madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1)
write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0)
r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0)
write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18)
r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380))
pipe(&(0x7f00000001c0)={<r7=>0xffffffffffffffff})
fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6})

[  709.047366] audit: type=1400 audit(1569846842.332:11309): avc:  denied  { map } for  pid=20934 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  709.084489] audit: type=1400 audit(1569846842.332:11310): avc:  denied  { map } for  pid=20934 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  709.224784] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20958]
[  709.247370] audit: type=1400 audit(1569846842.412:11311): avc:  denied  { map } for  pid=20938 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  709.366604] audit: type=1400 audit(1569846842.412:11312): avc:  denied  { map } for  pid=20938 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  709.494612] audit: type=1400 audit(1569846842.442:11313): avc:  denied  { map } for  pid=20938 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:05 executing program 1:

12:34:05 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, r0)

12:34:05 executing program 2:

12:34:05 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:05 executing program 4:
r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x0)
socket$alg(0x26, 0x5, 0x0)
mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10)
r3 = dup2(r2, r2)
write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0)
ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1")
madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1)
write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0)
r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0)
write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18)
r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380))
pipe(&(0x7f00000001c0)={<r7=>0xffffffffffffffff})
fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6})

12:34:05 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0)

12:34:05 executing program 1:

12:34:05 executing program 2:

[  711.271721] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20973]
12:34:05 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, r0)

12:34:05 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140))

12:34:05 executing program 4:
r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaa0000000000000000000000000000000000009d52000002000002fb020000000000018820907800c2040060b680fa0000000000000000000000000000ffffffffffac30000000000000000000ffffac14ffbb0000000000000000000066d878317bd3eb00c78626812b4491d69cc93a91535ed54c1c8e151b6b2fa749d51bcdf10d6d53ee63979a3feb144afa3ba796d1a28d2a9047fc49e7f3cad2b26bb121d6125b59ad393c6dccbf0770c330f785fec51e768e3a8005da95d2080a7aba3760350bc00d5b00d56bb0159b1070b92dbf2062bc3a960b4e7aa2d2ab7ab49b385c3715b142113b84b3b97563c2450ee9386a97097718c7748425f03fd40107541272dd63d324470ce3a75ac1714ed590f3db6565124fa38bec41bf3ea2c1871519e4d141f67f80fec7e7040fff7f00000000000058c338b147aa0d4c1272c4328298c2d73aa8a1048667300d776a7d51811627756e00ee8f2f4ebfedf7be"], 0x0)
socket$alg(0x26, 0x5, 0x0)
mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10)
r3 = dup2(r2, r2)
write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0)
ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1")
madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1)
write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0)
r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0)
write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18)
r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380))
pipe(&(0x7f00000001c0)={<r7=>0xffffffffffffffff})
fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6})

12:34:05 executing program 1:

12:34:05 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

[  711.829660] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20989]
12:34:05 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, r0)

12:34:05 executing program 1:
open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0)
r0 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0)
fadvise64(r0, 0x0, 0x0, 0x0)

12:34:05 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)

12:34:05 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

[  712.091133] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20996]
12:34:08 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0)

12:34:08 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
inotify_init1(0x0)

12:34:08 executing program 4:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
poll(&(0x7f0000000140)=[{}, {r1}], 0x2, 0x0)

12:34:08 executing program 1:
r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
read$eventfd(r0, 0x0, 0xfffffceb)

12:34:08 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:08 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))

12:34:08 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:08 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0)

[  714.398373] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[21016]
[  714.410734] kauditd_printk_skb: 134 callbacks suppressed
[  714.410742] audit: type=1400 audit(1569846848.342:11448): avc:  denied  { block_suspend } for  pid=21013 comm="syz-executor.2" capability=36  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1
12:34:08 executing program 1:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
poll(&(0x7f0000000140)=[{}, {}, {}, {r1, 0x40}], 0x4, 0x0)

12:34:08 executing program 4:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000480)=""/246)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$EVIOCGREP(r0, 0x4004743c, 0x0)

12:34:08 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

[  714.594161] audit: type=1400 audit(1569846848.442:11449): avc:  denied  { block_suspend } for  pid=21012 comm="syz-executor.4" capability=36  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1
[  714.740323] audit: type=1400 audit(1569846848.462:11450): avc:  denied  { map } for  pid=21019 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79254 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:34:08 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:08 executing program 0:
fchdir(0xffffffffffffffff)
open(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb)
request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0)

[  714.923466] audit: type=1400 audit(1569846848.532:11451): avc:  denied  { map } for  pid=21023 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:08 executing program 1:

[  715.035948] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[21037]
[  715.057187] audit: type=1400 audit(1569846848.532:11452): avc:  denied  { map } for  pid=21023 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:09 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

[  715.150445] PPPIOCDETACH file->f_count=2
12:34:09 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

[  715.175166] audit: type=1400 audit(1569846848.612:11453): avc:  denied  { map } for  pid=21023 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  715.246002] audit: type=1400 audit(1569846848.622:11454): avc:  denied  { map } for  pid=21023 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  715.436688] audit: type=1400 audit(1569846848.652:11455): avc:  denied  { map } for  pid=21025 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  715.529797] audit: type=1400 audit(1569846848.662:11456): avc:  denied  { map } for  pid=21025 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  715.608142] audit: type=1400 audit(1569846848.672:11457): avc:  denied  { map } for  pid=21025 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:11 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)

12:34:11 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:11 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:11 executing program 0:

12:34:11 executing program 4:

12:34:11 executing program 1:

12:34:11 executing program 0:

12:34:11 executing program 1:

12:34:11 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
perf_event_open(&(0x7f000001d000)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

12:34:11 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:11 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:11 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:14 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
r65 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)

12:34:14 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:14 executing program 0:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000005c0)=""/165, 0x3e, 0xa5, 0x1}, 0x20)

12:34:14 executing program 1:
r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
finit_module(r0, 0x0, 0x0)

12:34:14 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0xb, 0x0, &(0x7f0000000140))

12:34:14 executing program 5:
r0 = inotify_init1(0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:14 executing program 4:
accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240))
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)
syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0)

12:34:14 executing program 5:
r0 = inotify_init1(0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:14 executing program 0:
syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00')

[  720.663343] kauditd_printk_skb: 102 callbacks suppressed
[  720.663352] audit: type=1400 audit(1569846854.602:11560): avc:  denied  { module_load } for  pid=21081 comm="syz-executor.1" path="/proc/21081/task/21085/attr/current" dev="proc" ino=79365 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1
12:34:14 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:14 executing program 1:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
write$P9_RLOCK(r1, &(0x7f00000004c0)={0x8}, 0x8)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write(r1, &(0x7f0000000600)='4', 0x1)

[  720.790987] audit: type=1400 audit(1569846854.722:11561): avc:  denied  { map } for  pid=21089 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=80362 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:34:14 executing program 5:
r0 = inotify_init1(0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

[  720.962329] audit: type=1400 audit(1569846854.842:11562): avc:  denied  { map } for  pid=21091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  721.166955] audit: type=1400 audit(1569846854.852:11563): avc:  denied  { map } for  pid=21091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  721.323597] audit: type=1400 audit(1569846854.862:11564): avc:  denied  { map } for  pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  721.647615] audit: type=1400 audit(1569846854.862:11565): avc:  denied  { map } for  pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  721.828312] audit: type=1400 audit(1569846854.942:11566): avc:  denied  { map } for  pid=21091 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  721.857269] audit: type=1400 audit(1569846854.962:11567): avc:  denied  { map } for  pid=21097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  721.920220] audit: type=1400 audit(1569846854.962:11568): avc:  denied  { map } for  pid=21097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  721.951284] audit: type=1400 audit(1569846854.982:11569): avc:  denied  { map } for  pid=21097 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:17 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)

12:34:17 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0)
keyctl$clear(0x7, r1)

12:34:17 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f0000000000)={0xfff, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0x0, 0x0)

12:34:17 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:17 executing program 1:
r0 = socket(0x100000010, 0x200080002, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', <r2=>0x0})
bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="440400002800070500"/20, @ANYRES32=r3, @ANYBLOB="00000000090000000000000008000100636271001804020004040600000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c47ed8b9829ed94d76b132e00000000000000000000040000000000000000000000000010000000009da2d99a4d0eafc14c82000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a193ec32adcd00000000000000000000000000000000000000000000000000ffe800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002e3c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000f4ff000000000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100005000500000000006198ccdd00000000000000f77f0000000000000000000000080000004df853e6779f6084e84140ebd5fbbe0c1af648d5df07588523ebd8c2b2238b9b1c92357383f274666968c19d1a9c0e36287c8b2c972b7e7a37135500"/1168], 0x444}}, 0x0)
sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0)

12:34:17 executing program 5:
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r0=>0x0})
rt_sigqueueinfo(r0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:17 executing program 5:
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r0=>0x0})
rt_sigqueueinfo(r0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:17 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{}, {}], 0x2, 0x0)

12:34:17 executing program 5:
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r0=>0x0})
rt_sigqueueinfo(r0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:17 executing program 0:
setresuid(0x0, 0xfffe, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b700000000ffffff840000000000000007000000000000009500000000000000f7a543c51978c638d0589567b4b1ab7237096432accc"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48)

12:34:17 executing program 4:
perf_event_open(&(0x7f0000002900)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f0000000140)='net/netfilter\x00')

12:34:17 executing program 1:

12:34:20 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400))

12:34:20 executing program 1:

12:34:20 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:20 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{}, {}], 0x2, 0x0)

12:34:20 executing program 0:

12:34:20 executing program 4:

12:34:20 executing program 4:

12:34:20 executing program 1:

12:34:20 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:20 executing program 0:

12:34:20 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{}, {}], 0x2, 0x0)

[  726.965615] kauditd_printk_skb: 85 callbacks suppressed
[  726.965624] audit: type=1400 audit(1569846860.902:11655): avc:  denied  { map } for  pid=21155 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  727.118524] audit: type=1400 audit(1569846860.902:11656): avc:  denied  { map } for  pid=21155 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:21 executing program 4:

[  727.282401] audit: type=1400 audit(1569846860.912:11657): avc:  denied  { map } for  pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  727.408770] audit: type=1400 audit(1569846860.912:11658): avc:  denied  { map } for  pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  727.581718] audit: type=1400 audit(1569846860.942:11659): avc:  denied  { map } for  pid=21154 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79468 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  727.627360] audit: type=1400 audit(1569846860.952:11660): avc:  denied  { map } for  pid=21155 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  727.650152] audit: type=1400 audit(1569846860.972:11661): avc:  denied  { map } for  pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  727.675099] audit: type=1400 audit(1569846860.972:11662): avc:  denied  { map } for  pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  727.700137] audit: type=1400 audit(1569846860.992:11663): avc:  denied  { map } for  pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  727.725135] audit: type=1400 audit(1569846861.052:11664): avc:  denied  { map } for  pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:23 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)
openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)

12:34:23 executing program 4:

12:34:23 executing program 1:

12:34:23 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:23 executing program 0:

12:34:23 executing program 2:
r0 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r0}, {}], 0x2, 0x0)

12:34:23 executing program 4:

12:34:23 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x3, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0)
recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0)
socket(0x200000000000011, 0x0, 0x0)
ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'bcsh0\x00', 0x600})
socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33)

12:34:23 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:23 executing program 0:
r0 = syz_open_dev$sg(0x0, 0x0, 0x0)
migrate_pages(0x0, 0x0, 0x0, 0x0)
openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffe5d, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc4684ed49411482, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27)
dup(r0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000140)=0x32, 0x16e)
setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x82, &(0x7f0000000000)=0x8, 0x4)

12:34:23 executing program 2:
r0 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r0}, {}], 0x2, 0x0)

12:34:24 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCFLSH(r0, 0x5409, 0x0)

12:34:26 executing program 2:
r0 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r0}, {}], 0x2, 0x0)

12:34:26 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:26 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003180)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
shutdown(r1, 0x0)
write$binfmt_script(r0, 0x0, 0x0)

12:34:26 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x3, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0)
recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0)
socket(0x200000000000011, 0x0, 0x0)
ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'bcsh0\x00', 0x600})
socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33)

12:34:26 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r60=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r61=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r62=>0x0})
getresgid(&(0x7f0000000c00)=<r63=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1)

12:34:26 executing program 0:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCFLSH(r0, 0x80045438, 0x0)

12:34:26 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:26 executing program 2:
r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:26 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, <r4=>0x0}, &(0x7f0000000040)=0x7)
setreuid(r4, 0xffffffffffffffff)
ioprio_get$uid(0x3, r4)

12:34:27 executing program 0:

[  733.068788] kauditd_printk_skb: 70 callbacks suppressed
[  733.068799] audit: type=1400 audit(1569846867.002:11735): avc:  denied  { map } for  pid=21210 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=80585 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:34:27 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, 0x0)
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:27 executing program 2:
r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

[  733.324918] audit: type=1400 audit(1569846867.012:11736): avc:  denied  { map } for  pid=21215 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:27 executing program 4:

12:34:27 executing program 1:

12:34:27 executing program 0:

[  733.488244] audit: type=1400 audit(1569846867.052:11737): avc:  denied  { map } for  pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:27 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, 0x0)
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

[  733.651080] audit: type=1400 audit(1569846867.072:11738): avc:  denied  { map } for  pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  733.790455] audit: type=1400 audit(1569846867.092:11739): avc:  denied  { map } for  pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  733.921806] audit: type=1400 audit(1569846867.102:11740): avc:  denied  { map } for  pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  734.090144] audit: type=1400 audit(1569846867.112:11741): avc:  denied  { map } for  pid=21214 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  734.133765] audit: type=1400 audit(1569846867.112:11742): avc:  denied  { map } for  pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  734.168556] audit: type=1400 audit(1569846867.112:11743): avc:  denied  { map } for  pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  734.193566] audit: type=1400 audit(1569846867.142:11744): avc:  denied  { map } for  pid=21214 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:29 executing program 4:

12:34:29 executing program 2:
r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:29 executing program 0:

12:34:29 executing program 1:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000000))
perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd0}, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = msgget$private(0x0, 0x200)
msgctl$IPC_RMID(r0, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000000080), 0x8)
sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2)
socket$inet6(0xa, 0x2, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x10420003)
getgroups(0x0, &(0x7f0000000040))
chown(0x0, 0x0, 0x0)
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x8)
pipe(&(0x7f0000000080))
r3 = open(0x0, 0x82040, 0x0)
fcntl$setlease(r3, 0x400, 0x0)
fcntl$setlease(r3, 0x400, 0x2)

12:34:29 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0)

12:34:29 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, 0x0)
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:29 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$sock_SIOCBRADDBR(r1, 0x894c, 0x0)

12:34:29 executing program 0:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
recvmmsg(r0, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, 0x0)

12:34:30 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:30 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140))
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:30 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
r3 = dup(r2)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
r5 = dup3(r3, r4, 0x0)
getsockopt$MISDN_TIME_STAMP(r5, 0x0, 0x32, &(0x7f0000000040), &(0x7f0000000080)=0x4)

12:34:30 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000000)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast2}}}, 0x104)
prctl$PR_GET_DUMPABLE(0x3)
getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x84000)
write$P9_RVERSION(r1, &(0x7f0000000340)={0x5, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15)
r2 = dup(r1)
write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18)
ioctl$sock_SIOCSIFBR(r2, 0x8941, 0x0)
mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil)
mlockall(0x3)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'syzkaller0\x00', {0x2, 0x4e21, @loopback}})

12:34:30 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140))
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:30 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:30 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)

12:34:30 executing program 1:

12:34:33 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140))
rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:33 executing program 1:

12:34:33 executing program 0:

12:34:33 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:33 executing program 4:

12:34:33 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))

12:34:33 executing program 4:

12:34:33 executing program 1:

12:34:33 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

12:34:33 executing program 0:
r0 = socket$kcm(0x2b, 0x44000000000001, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@quiet='quiet'}, {@dir_umask={'dir_umask'}}], [{@obj_user={'obj_user', 0x3d, 'keyring'}}]})

12:34:33 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

[  739.282295] kauditd_printk_skb: 100 callbacks suppressed
[  739.282304] audit: type=1400 audit(1569846873.222:11845): avc:  denied  { map } for  pid=21296 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79688 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  739.428825] audit: type=1400 audit(1569846873.332:11846): avc:  denied  { map } for  pid=21298 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:33 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x0, 0x0)

12:34:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:33 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080))

[  739.596440] audit: type=1400 audit(1569846873.342:11847): avc:  denied  { map } for  pid=21298 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  739.740158] audit: type=1400 audit(1569846873.362:11848): avc:  denied  { map } for  pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:33 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:33 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
semget(0x1, 0x496f75b9df0d8030, 0x0)

[  739.896578] audit: type=1400 audit(1569846873.362:11849): avc:  denied  { map } for  pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  740.016356] audit: type=1400 audit(1569846873.412:11850): avc:  denied  { map } for  pid=21298 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:34 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x0, 0x0)

[  740.168596] audit: type=1400 audit(1569846873.432:11851): avc:  denied  { map } for  pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  740.289005] audit: type=1400 audit(1569846873.442:11852): avc:  denied  { map } for  pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  740.363287] audit: type=1400 audit(1569846873.512:11853): avc:  denied  { map } for  pid=21303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  740.420496] audit: type=1400 audit(1569846873.512:11854): avc:  denied  { map } for  pid=21303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:36 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)

12:34:36 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8})
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:36 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:36 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080))

12:34:36 executing program 0:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f00004d1ff0)='/dev/sequencer2\x00', 0x0, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0)

12:34:36 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x0, 0x0)

12:34:36 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080))

12:34:36 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180))

12:34:36 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:36 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0)
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:36 executing program 0:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0)
mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0)

12:34:36 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180))

12:34:39 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:39 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080))

12:34:39 executing program 5:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180))

12:34:39 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0)
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:39 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)

12:34:39 executing program 0:

12:34:39 executing program 0:

12:34:39 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0)
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:39 executing program 5:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x3, 0x70, 0x8, 0x40, 0x0, 0xa4, 0x0, 0x0, 0x80000, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xb11}, 0x400, 0x0, 0x0, 0x7, 0x5})
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3})
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27)

12:34:39 executing program 1:
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080))

12:34:39 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

[  745.448947] kauditd_printk_skb: 92 callbacks suppressed
[  745.448956] audit: type=1400 audit(1569846879.382:11947): avc:  denied  { map } for  pid=21374 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:39 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0)
renameat(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000003c0)='./file0\x00')

[  745.660594] audit: type=1400 audit(1569846879.382:11948): avc:  denied  { map } for  pid=21374 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:39 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:39 executing program 1:
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080))

[  745.854280] audit: type=1400 audit(1569846879.392:11949): avc:  denied  { map } for  pid=21375 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  745.968678] audit: type=1400 audit(1569846879.392:11951): avc:  denied  { map } for  pid=21374 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:40 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

[  746.089192] audit: type=1400 audit(1569846879.392:11950): avc:  denied  { map } for  pid=21375 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:40 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

[  746.251373] audit: type=1400 audit(1569846879.392:11952): avc:  denied  { map } for  pid=21375 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  746.380597] audit: type=1400 audit(1569846879.392:11953): avc:  denied  { map } for  pid=21374 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  746.529598] audit: type=1400 audit(1569846879.392:11954): avc:  denied  { map } for  pid=21375 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  746.613374] audit: type=1400 audit(1569846879.442:11955): avc:  denied  { map } for  pid=21372 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79777 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  746.673789] audit: type=1400 audit(1569846879.602:11956): avc:  denied  { map } for  pid=21381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:42 executing program 0:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(r0, 0x5501)
write$uinput_user_dev(r0, &(0x7f0000000ac0)={'syz0\x00'}, 0x45c)

12:34:42 executing program 1:
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080))

12:34:42 executing program 5:
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00'})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond_sl\xe1v\x83_0\xe3\xff\x00', 0x0})

12:34:42 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:42 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:42 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
r59 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)

12:34:42 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:42 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

[  748.407587] input: syz1 as /devices/virtual/input/input6
12:34:42 executing program 1:
r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080))

[  748.526894] input: syz1 as /devices/virtual/input/input7
12:34:42 executing program 0:

12:34:42 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, 0x0, 0x0)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:43 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:43 executing program 1:
r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080))

12:34:43 executing program 0:

12:34:43 executing program 5:

12:34:43 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, 0x0, 0x0)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:45 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)

12:34:45 executing program 5:

12:34:45 executing program 0:

12:34:45 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:45 executing program 1:
r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080))

12:34:45 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, 0x0, 0x0)
poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0)

12:34:45 executing program 5:

12:34:45 executing program 0:
r0 = syz_open_dev$sg(0x0, 0x0, 0x0)
migrate_pages(0x0, 0x0, 0x0, 0x0)
openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffe5d, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='bbr\x00', 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc4684ed49411482, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27)
dup(r0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000140)=0x32, 0x16e)
setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x82, &(0x7f0000000000)=0x8, 0x4)

12:34:45 executing program 4:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:45 executing program 1:
syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080))

12:34:45 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(0x0, 0x0, 0x0)

[  751.618071] kauditd_printk_skb: 154 callbacks suppressed
[  751.618081] audit: type=1400 audit(1569846885.552:12111): avc:  denied  { map } for  pid=21459 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81945 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  751.787991] audit: type=1400 audit(1569846885.622:12112): avc:  denied  { map } for  pid=21462 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:45 executing program 5:
socket$packet(0x11, 0x3, 0x300)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f")
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'})
fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0)
add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20)
chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x363)
mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0)
execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58)

[  751.968424] audit: type=1400 audit(1569846885.622:12113): avc:  denied  { map } for  pid=21462 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.117550] audit: type=1400 audit(1569846885.622:12114): avc:  denied  { map } for  pid=21462 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.232526] audit: type=1400 audit(1569846885.622:12115): avc:  denied  { map } for  pid=21462 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.293730] audit: type=1400 audit(1569846885.652:12116): avc:  denied  { map } for  pid=21463 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.317074] audit: type=1400 audit(1569846885.652:12117): avc:  denied  { map } for  pid=21463 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.340187] audit: type=1400 audit(1569846885.662:12118): avc:  denied  { map } for  pid=21462 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.363451] audit: type=1400 audit(1569846885.662:12119): avc:  denied  { map } for  pid=21463 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.388271] audit: type=1400 audit(1569846885.682:12120): avc:  denied  { map } for  pid=21463 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  752.412393] protocol 88fb is buggy, dev hsr_slave_0
[  752.412445] protocol 88fb is buggy, dev hsr_slave_1
[  752.412520] protocol 88fb is buggy, dev hsr_slave_0
[  752.412558] protocol 88fb is buggy, dev hsr_slave_1
12:34:48 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400))

12:34:48 executing program 0:
socket$packet(0x11, 0x3, 0x300)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f")
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'})
fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0)
add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20)
chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x363)
mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0)
execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58)

12:34:48 executing program 1:
syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080))

12:34:48 executing program 4:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:48 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(0x0, 0x0, 0x0)

12:34:48 executing program 5:
socket$packet(0x11, 0x3, 0x300)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f")
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'})
fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0)
add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20)
chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x363)
mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0)
execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58)

12:34:48 executing program 1:
syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080))

12:34:48 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(0x0, 0x0, 0x0)

12:34:48 executing program 4:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:48 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, 0x0)

[  754.950167] protocol 88fb is buggy, dev hsr_slave_0
[  754.956187] protocol 88fb is buggy, dev hsr_slave_1
12:34:48 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{r1}], 0x1, 0x0)

12:34:48 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

[  755.280163] protocol 88fb is buggy, dev hsr_slave_0
[  755.285331] protocol 88fb is buggy, dev hsr_slave_1
12:34:51 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, 0x0)

12:34:51 executing program 5:
socket$packet(0x11, 0x3, 0x300)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f")
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'})
fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0)
add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20)
chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x363)
mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0)
execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58)

12:34:51 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:51 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140), 0x0, 0x0)

12:34:51 executing program 0:
statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/90)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00')
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = getpid()
exit_group(0x0)
memfd_create(&(0x7f0000000080)='Et\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600))
r1 = timerfd_create(0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0})
fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
setresgid(r3, r4, 0x0)
timerfd_create(0x0, 0x0)
fstat(0xffffffffffffffff, 0x0)
fstat(0xffffffffffffffff, 0x0)
getgroups(0x2, &(0x7f0000000640)=[r3, 0x0])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0))
r5 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, 0x0, 0x0)
keyctl$instantiate(0xc, r5, &(0x7f0000000280)=ANY=[@ANYBLOB="6c6f920300006372727074667320747275737465641f1c9188aaa491262030303030303030303030303030303030843034372035003400154f0669038f9375ea9625ed412159253adc16fc1b326c9d91c21f4522e040c7f7233fec39f11c1898474b8b6290d922c983b7840c96f5c29e58e713431b53023d08ce5218cea3aa9a36ff351eacce33661042942fc68c3d3df7e3e4a21fdf644aff63b536bcb8951a85d563cd9b0e40b5966accf4fefa"], 0x1, 0xfffffffffffffffe)
openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x200, 0x0)
socket(0x10, 0x2, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)

12:34:51 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)

[  757.670112] protocol 88fb is buggy, dev hsr_slave_0
[  757.675292] protocol 88fb is buggy, dev hsr_slave_1
12:34:51 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140), 0x0, 0x0)

12:34:51 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:51 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, 0x0)

[  757.846559] kauditd_printk_skb: 104 callbacks suppressed
[  757.846568] audit: type=1400 audit(1569846891.782:12225): avc:  denied  { create } for  pid=21534 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  758.029745] audit: type=1400 audit(1569846891.792:12226): avc:  denied  { create } for  pid=21532 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
12:34:52 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0))
getegid()
syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)

[  758.173622] audit: type=1400 audit(1569846891.862:12227): avc:  denied  { map } for  pid=21541 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=82040 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:34:52 executing program 5:
r0 = socket$inet6(0xa, 0x3, 0x1)
setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000040)=0x6c, 0x4)

12:34:52 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

[  758.325963] audit: type=1400 audit(1569846891.862:12228): avc:  denied  { write } for  pid=21534 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:34:52 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getgroups(0x1, &(0x7f00000004c0)=[0xee01])
r1 = socket$inet(0x2, 0x3, 0x2)
setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x100000000002, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88)
dup2(r0, r1)

12:34:52 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140), 0x0, 0x0)

[  758.496835] audit: type=1400 audit(1569846891.862:12229): avc:  denied  { setattr } for  pid=21532 comm="syz-executor.5" name="NETLINK" dev="sockfs" ino=81173 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  758.657065] audit: type=1400 audit(1569846891.912:12230): avc:  denied  { read } for  pid=21534 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:34:52 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070")
restart_syscall()

[  758.805179] audit: type=1400 audit(1569846891.942:12231): avc:  denied  { map } for  pid=21545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:52 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x16, 0x1, 0x0, 0x5}, 0x3c)

[  758.904788] audit: type=1400 audit(1569846891.942:12232): avc:  denied  { map } for  pid=21545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  759.062678] audit: type=1400 audit(1569846891.962:12233): avc:  denied  { map } for  pid=21545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  759.167765] audit: type=1400 audit(1569846891.992:12234): avc:  denied  { map } for  pid=21545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:54 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r54=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r55=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r56=>0x0})
getresgid(&(0x7f0000000c00)=<r57=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)

12:34:54 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{}], 0x1, 0x0)

12:34:54 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:54 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getgroups(0x1, &(0x7f00000004c0)=[0xee01])
r1 = socket$inet(0x2, 0x3, 0x2)
setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x100000000002, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88)
dup2(r0, r1)

12:34:54 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_GET_CHILD_SUBREAPER(0x18)

12:34:54 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$ARPT_SO_GET_INFO(r0, 0x6, 0x24, 0x0, &(0x7f0000000140))

12:34:54 executing program 5:
setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)='O', 0x1)
uname(&(0x7f0000000000)=""/3)

12:34:54 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$ARPT_SO_GET_INFO(r0, 0x6, 0x4, 0x0, &(0x7f0000000140))

12:34:54 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:54 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{}], 0x1, 0x0)

12:34:54 executing program 1:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0)
setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000100)=0xfff, 0x4)

12:34:55 executing program 0:
socket$inet(0x2, 0x3, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x333, 0x0)
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x40)
fchdir(r0)
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0)
write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
creat(&(0x7f00000003c0)='./bus\x00', 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5414, &(0x7f0000000200))
fcntl$getflags(0xffffffffffffffff, 0x401)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x670, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000300)=""/144)
io_setup(0x4, &(0x7f0000000180)=<r3=>0x0)
io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000000000, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xe0000}])
pipe(&(0x7f0000000040))
socket$inet(0x2, 0x0, 0x0)

12:34:57 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0)

12:34:57 executing program 5:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x0)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:34:57 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:57 executing program 2:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4))
signalfd(r0, &(0x7f0000392ff8), 0x8)
poll(&(0x7f0000000140)=[{}], 0x1, 0x0)

12:34:57 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:34:57 executing program 0:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})
inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140))
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9})

[  763.852540] ptrace attach of "/root/syz-executor.0"[6984] was attempted by "/root/syz-executor.0"[21635]
12:34:57 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:34:57 executing program 2:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000240)={[{@nfs_export_on='nfs_export=on'}]})

12:34:57 executing program 5:
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x101000, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x1000000, 0x10, 0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000a40))
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100))
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
dup(0xffffffffffffffff)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0)

[  763.897385] kauditd_printk_skb: 121 callbacks suppressed
[  763.897395] audit: type=1400 audit(1569846897.832:12356): avc:  denied  { map } for  pid=21632 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81331 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:34:57 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:34:57 executing program 0:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @broadcast}, @rand_addr="1b2113104263083c1ff2033a53e5e8ad", 0x0, 0x0, 0xd1})

[  764.096617] overlayfs: unrecognized mount option "nfs_export=on" or missing value
[  764.117795] audit: type=1400 audit(1569846898.052:12357): avc:  denied  { map } for  pid=21647 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:34:58 executing program 5:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1)
socket$inet6(0xa, 0x0, 0x8010000400000084)
socket$inet(0x2, 0x1, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8]}, 0x45c)
fallocate(r1, 0x0, 0x0, 0x2000002)
fallocate(r0, 0x0, 0x0, 0x110001)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20})
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8})
connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10)

[  764.206909] audit: type=1400 audit(1569846898.082:12358): avc:  denied  { map } for  pid=21647 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  764.366309] audit: type=1400 audit(1569846898.082:12359): avc:  denied  { map } for  pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  764.528273] audit: type=1400 audit(1569846898.092:12360): avc:  denied  { map } for  pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  764.698971] audit: type=1400 audit(1569846898.092:12361): avc:  denied  { map } for  pid=21647 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  764.757651] audit: type=1400 audit(1569846898.092:12362): avc:  denied  { map } for  pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  764.782988] audit: type=1400 audit(1569846898.112:12363): avc:  denied  { map } for  pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  764.807212] audit: type=1400 audit(1569846898.112:12364): avc:  denied  { map } for  pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  764.834338] audit: type=1400 audit(1569846898.122:12365): avc:  denied  { map } for  pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:00 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:35:00 executing program 2:
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
creat(0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
write$P9_RREAD(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="82"], 0x1)
fallocate(r1, 0x0, 0x0, 0xfff)
fallocate(r0, 0x0, 0x0, 0x110001)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1})

12:35:00 executing program 0:
syz_open_dev$admmidi(0xfffffffffffffffe, 0x0, 0x0)

12:35:00 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:00 executing program 5:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1)
socket$inet6(0xa, 0x0, 0x8010000400000084)
socket$inet(0x2, 0x1, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8]}, 0x45c)
fallocate(r1, 0x0, 0x0, 0x2000002)
fallocate(r0, 0x0, 0x0, 0x110001)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20})
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8})
connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10)

12:35:00 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))

12:35:00 executing program 0:
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
socket$inet(0x2, 0x4000000000000001, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00')
write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0)
modify_ldt$write2(0x11, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x101000, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000a40))
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100))
dup(0xffffffffffffffff)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0)

12:35:00 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:35:01 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0)
write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TCFLSH(r1, 0x540b, 0x2)

12:35:01 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:01 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:35:01 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

12:35:01 executing program 5:
syz_emit_ethernet(0x52, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0xc, 0x5, 0x0, 0x0, [{[@empty]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)

12:35:01 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:35:01 executing program 2:
open(0x0, 0x20141042, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000000000}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00')
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet_tcp(0x2, 0x1, 0x0)
clone(0x8002100, &(0x7f0000000a80), 0x0, &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f2b77da84cdd98d4809640159e88e61e47fddbad421e7b2")
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cgroup.controllers\x00', 0x0, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800))
add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="a1deb09fb229f3e327206d312b9d2546ceb8e2851ac20115cf87f51f3bceaf704bfaf2847ce9b975dd9a72c93ed3608d5f3634b81ebcdb1b0c218171c1ca41cb4eb76df433e3c78e7c3e476f2d5117e90b5854cd0dbc44ac612e54b997f643e61d47a59cc0943702650117c34b47a5a20dea48101102dba38c08dbaf98f16cc56d241d8d8a91caebb1710ec44ced951875b10f9585db7b9bd9", 0x99, 0xfffffffffffffffb)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff)

12:35:01 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:02 executing program 5:
syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4, 0x5}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)

[  768.621573] IPVS: ftp: loaded support on port[0] = 21
[  769.075655] kauditd_printk_skb: 144 callbacks suppressed
[  769.075665] audit: type=1400 audit(1569846903.012:12510): avc:  denied  { create } for  pid=21711 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  769.105745] audit: type=1400 audit(1569846903.022:12511): avc:  denied  { sys_admin } for  pid=21711 comm="syz-executor.2" capability=21  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
[  769.130985] audit: type=1400 audit(1569846903.022:12512): avc:  denied  { sys_admin } for  pid=21711 comm="syz-executor.2" capability=21  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
[  769.252029] audit: type=1400 audit(1569846903.192:12513): avc:  denied  { map } for  pid=21731 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  769.727523] audit: type=1400 audit(1569846903.662:12514): avc:  denied  { map } for  pid=21733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:03 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)

12:35:03 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

12:35:03 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:35:03 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:03 executing program 5:
syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)

12:35:03 executing program 2:
open(0x0, 0x20141042, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000000000}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00')
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet_tcp(0x2, 0x1, 0x0)
clone(0x8002100, &(0x7f0000000a80), 0x0, &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f2b77da84cdd98d4809640159e88e61e47fddbad421e7b2")
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cgroup.controllers\x00', 0x0, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800))
add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="a1deb09fb229f3e327206d312b9d2546ceb8e2851ac20115cf87f51f3bceaf704bfaf2847ce9b975dd9a72c93ed3608d5f3634b81ebcdb1b0c218171c1ca41cb4eb76df433e3c78e7c3e476f2d5117e90b5854cd0dbc44ac612e54b997f643e61d47a59cc0943702650117c34b47a5a20dea48101102dba38c08dbaf98f16cc56d241d8d8a91caebb1710ec44ced951875b10f9585db7b9bd9", 0x99, 0xfffffffffffffffb)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff)

12:35:04 executing program 5:

[  770.095624] audit: type=1400 audit(1569846904.032:12515): avc:  denied  { sys_admin } for  pid=21734 comm="syz-executor.0" capability=21  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
12:35:04 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:35:04 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

[  770.236924] audit: type=1400 audit(1569846904.092:12516): avc:  denied  { sys_admin } for  pid=21734 comm="syz-executor.0" capability=21  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
[  770.335707] audit: type=1400 audit(1569846904.182:12517): avc:  denied  { sys_admin } for  pid=21739 comm="syz-executor.2" capability=21  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
12:35:04 executing program 5:

[  770.441692] audit: type=1400 audit(1569846904.192:12518): avc:  denied  { sys_admin } for  pid=21739 comm="syz-executor.2" capability=21  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
[  770.511563] audit: type=1400 audit(1569846904.222:12519): avc:  denied  { create } for  pid=21739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
12:35:04 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30)

12:35:04 executing program 5:

12:35:07 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
r53 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)

12:35:07 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
fchdir(0xffffffffffffffff)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:07 executing program 5:

12:35:07 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, 0x0)

12:35:07 executing program 0:

12:35:07 executing program 2:

12:35:07 executing program 5:
mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil)

12:35:07 executing program 0:
r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x20, 0x35da})

12:35:07 executing program 2:
r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0)
ioctl$BLKTRACESETUP(r0, 0x401870cc, 0x0)

12:35:07 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, 0x0)

12:35:07 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
fchdir(0xffffffffffffffff)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:07 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
modify_ldt$write2(0x11, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x101000, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
dup(0xffffffffffffffff)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)

12:35:10 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)
socket$inet_tcp(0x2, 0x1, 0x0)

12:35:10 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
fchdir(0xffffffffffffffff)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:10 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @remote, 0x4e24, 0x3, 'dh\x00', 0x0, 0x3, 0xf}, {@empty, 0x0, 0x1, 0xfffffffa, 0xc8}}, 0x44)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup3(r1, 0xffffffffffffffff, 0x80000)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27)

12:35:10 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
modify_ldt$write2(0x11, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
dup(0xffffffffffffffff)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)

12:35:10 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
msgctl$MSG_STAT(0x0, 0xb, 0x0)

12:35:10 executing program 5:

12:35:10 executing program 5:

12:35:10 executing program 4:

12:35:10 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:10 executing program 2:

12:35:10 executing program 0:

12:35:10 executing program 5:

[  776.415564] kauditd_printk_skb: 81 callbacks suppressed
[  776.415573] audit: type=1400 audit(1569846910.352:12601): avc:  denied  { map } for  pid=21807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  776.610131] audit: type=1400 audit(1569846910.362:12602): avc:  denied  { map } for  pid=21804 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81593 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  776.792968] audit: type=1400 audit(1569846910.392:12603): avc:  denied  { map } for  pid=21807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  776.892065] audit: type=1400 audit(1569846910.392:12604): avc:  denied  { map } for  pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  776.962254] audit: type=1400 audit(1569846910.442:12605): avc:  denied  { map } for  pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  776.997043] audit: type=1400 audit(1569846910.462:12606): avc:  denied  { map } for  pid=21807 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  777.021340] audit: type=1400 audit(1569846910.482:12607): avc:  denied  { map } for  pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  777.046801] audit: type=1400 audit(1569846910.482:12608): avc:  denied  { map } for  pid=21811 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  777.071410] audit: type=1400 audit(1569846910.492:12609): avc:  denied  { map } for  pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  777.096097] audit: type=1400 audit(1569846910.512:12610): avc:  denied  { map } for  pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:13 executing program 5:
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000))
r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00')
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x46802)
io_setup(0x100000000000c333, &(0x7f0000000180)=<r2=>0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0)
ftruncate(r1, 0x48280)
r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0)
write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0)
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0)

12:35:13 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
r1 = socket(0x11, 0x800000003, 0x81)
bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
write$binfmt_aout(r1, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888, 0x0, 0x5700}}, 0x20)

12:35:13 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$revoke(0x3, r0)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

12:35:13 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:13 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)

12:35:13 executing program 0:
msgget$private(0x0, 0x0)
msgsnd(0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
prctl$PR_GET_TSC(0x19, &(0x7f0000000100))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
chdir(&(0x7f0000000300)='./file0\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
fallocate(r0, 0x0, 0x0, 0x110001)
creat(0x0, 0x0)

12:35:13 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:13 executing program 2:
perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
lseek(r0, 0x0, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0))
write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB=' '], 0x1)
fallocate(r0, 0x3, 0x0, 0x8020001)
lseek(r0, 0x0, 0x3)

12:35:13 executing program 4:
msgsnd(0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
prctl$PR_GET_TSC(0x19, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
chdir(&(0x7f0000000300)='./file0\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
fallocate(r0, 0x0, 0x0, 0x110001)

12:35:13 executing program 0:

12:35:13 executing program 2:

12:35:13 executing program 5:
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000))
r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00')
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x46802)
io_setup(0x100000000000c333, &(0x7f0000000180)=<r2=>0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0)
ftruncate(r1, 0x48280)
r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0)
write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0)
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0)

12:35:13 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:14 executing program 4:

12:35:14 executing program 0:

12:35:14 executing program 2:

12:35:16 executing program 1:
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:16 executing program 0:

12:35:16 executing program 2:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0)

12:35:16 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000))
r0 = socket(0x10, 0x2, 0x0)
write(r0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300))
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xa6e4033331142420}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$char_usb(0xffffffffffffffff, &(0x7f0000000000), 0x0)
r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r2, &(0x7f0000001400)="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", 0x600)
inotify_init1(0x80800)
getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="a8282b1e58de1500000365ffffff00e7df0700395032301de8ee64de48e904a04dc7bb0500000008007bc4092fbeb8657beae0c563fb13889960c74a8ebb5d191e55777414feb74febcb22cfed04c37d6316580029331128e3b901d309"], 0x5d)
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600)={0x53, 0x5, 0x401, 0x6, 0xffffffffffff7fff}, 0x14)
r4 = accept4(r2, &(0x7f0000000200)=@pptp, &(0x7f0000000480)=0x533, 0x0)
getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, 0x0, &(0x7f0000000140))
openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
sendfile(r2, r3, 0x0, 0x10000)
r5 = socket$inet6_udplite(0xa, 0x2, 0x88)
connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c)
r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x80a83, 0x0)
ioctl$KDADDIO(r6, 0x4b34, 0x20)
getsockopt$inet6_int(r5, 0x29, 0x10000000001, 0x0, &(0x7f00000000c0))
sendto(r5, 0x0, 0x0, 0x8001, &(0x7f0000000500)=@sco={0x1f, {0xd, 0x5, 0x5, 0x1, 0x101, 0x27}}, 0x80)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0)
fallocate(r7, 0x0, 0x0, 0x110003)
write$cgroup_int(r7, &(0x7f0000000040), 0x12)
ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/235})
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)

12:35:16 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400))

12:35:16 executing program 5:
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000))
r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00')
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x46802)
io_setup(0x100000000000c333, &(0x7f0000000180)=<r2=>0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0)
ftruncate(r1, 0x48280)
r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0)
write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0)
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0)

12:35:16 executing program 0:
r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
sendfile(r1, r0, 0x0, 0x3f)

12:35:16 executing program 2:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = getpid()
rt_tgsigqueueinfo(r0, r0, 0x37, &(0x7f0000000000))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ptrace(0x10, r0)
waitid(0x0, 0x0, &(0x7f0000001ff0), 0x5, 0x0)

12:35:16 executing program 1:
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

[  782.590517] kauditd_printk_skb: 103 callbacks suppressed
[  782.590526] audit: type=1804 audit(1569846916.522:12714): pid=21879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir777428982/syzkaller.lH425S/574/bus" dev="sda1" ino=17639 res=1
12:35:16 executing program 4:
r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
writev(r0, 0x0, 0x0)

[  782.858872] audit: type=1400 audit(1569846916.562:12715): avc:  denied  { map } for  pid=21874 comm="syz-executor.5" path="/root/syzkaller-testdir777428982/syzkaller.lH425S/574/bus" dev="sda1" ino=17639 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
12:35:16 executing program 1:
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

[  783.040326] ptrace attach of "/root/syz-executor.2"[21892] was attempted by "/root/syz-executor.2"[21899]
12:35:17 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, 0x0}, 0x0)

[  783.076647] audit: type=1400 audit(1569846916.602:12716): avc:  denied  { map } for  pid=21886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:17 executing program 5:

12:35:17 executing program 2:

[  783.233542] audit: type=1400 audit(1569846916.602:12717): avc:  denied  { map } for  pid=21886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  783.329244] audit: type=1804 audit(1569846916.632:12718): pid=21879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir777428982/syzkaller.lH425S/574/bus" dev="sda1" ino=17639 res=1
12:35:17 executing program 4:

[  783.481567] audit: type=1400 audit(1569846916.652:12719): avc:  denied  { map } for  pid=21886 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:17 executing program 1:
mkdir(0x0, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

[  783.585046] audit: type=1400 audit(1569846916.662:12720): avc:  denied  { map } for  pid=21886 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  783.689257] audit: type=1400 audit(1569846916.662:12721): avc:  denied  { map } for  pid=21884 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=82534 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  783.759203] audit: type=1400 audit(1569846916.692:12722): avc:  denied  { map } for  pid=21886 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  783.787869] audit: type=1400 audit(1569846916.702:12723): avc:  denied  { map } for  pid=21886 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:19 executing program 5:

12:35:19 executing program 0:

12:35:19 executing program 4:

12:35:19 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x100000400000003a)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c)
r1 = socket$inet6(0xa, 0x3, 0x100000400000003a)
r2 = dup2(r0, r1)
sendmsg$unix(r2, &(0x7f0000000840)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000080)="888ef87a", 0x4}], 0x1, &(0x7f00000007c0)=[@rights={{0xc}}], 0xc}, 0x0)

12:35:19 executing program 1:
mkdir(0x0, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:19 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)

12:35:19 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff})
splice(r0, 0x0, r0, 0x0, 0x8100003, 0x0)

12:35:19 executing program 2:
futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000)

12:35:19 executing program 1:
mkdir(0x0, 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:19 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4)
connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10)
sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=[{0x10}], 0x10}}], 0x2, 0x0)

12:35:19 executing program 0:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, r0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x0, 0x0)
mkdir(&(0x7f0000000180)='./file1\x00', 0x0)
getpeername(0xffffffffffffffff, 0x0, &(0x7f0000002a80))
symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00')
r1 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0)
mkdirat(r1, &(0x7f0000000340)='./file1\x00', 0x0)
mkdirat(r1, &(0x7f0000000380)='./file1/file0\x00', 0x0)
renameat2(r1, &(0x7f0000000000)='./file1/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2)

12:35:19 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(0x0, 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:19 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff})
gettid()
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
dup2(r0, r2)
sendmsg$unix(r1, &(0x7f0000000380)={&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0)

12:35:19 executing program 2:
futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000)

12:35:20 executing program 4:

12:35:20 executing program 0:

12:35:20 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(0x0, 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:22 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)

12:35:22 executing program 2:
futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000)

12:35:22 executing program 5:

12:35:22 executing program 4:

12:35:22 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(0x0, 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:22 executing program 0:

12:35:22 executing program 4:

12:35:22 executing program 5:

12:35:22 executing program 0:

12:35:22 executing program 2:
futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000)

[  788.763822] kauditd_printk_skb: 119 callbacks suppressed
[  788.763831] audit: type=1400 audit(1569846922.702:12843): avc:  denied  { map } for  pid=21972 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81882 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:35:22 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x0)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

[  788.873845] audit: type=1400 audit(1569846922.812:12844): avc:  denied  { map } for  pid=21975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:22 executing program 5:

[  788.961081] audit: type=1400 audit(1569846922.832:12845): avc:  denied  { map } for  pid=21975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  789.090895] audit: type=1400 audit(1569846922.842:12846): avc:  denied  { map } for  pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  789.238099] audit: type=1400 audit(1569846922.842:12847): avc:  denied  { map } for  pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  789.381727] audit: type=1400 audit(1569846922.852:12848): avc:  denied  { map } for  pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  789.539347] audit: type=1400 audit(1569846922.872:12849): avc:  denied  { map } for  pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  789.587432] audit: type=1400 audit(1569846922.872:12850): avc:  denied  { map } for  pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  789.617858] audit: type=1400 audit(1569846922.942:12851): avc:  denied  { map } for  pid=21977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  789.645595] audit: type=1400 audit(1569846922.942:12852): avc:  denied  { map } for  pid=21977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:25 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r48=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r49=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r50=>0x0})
getresgid(&(0x7f0000000c00)=<r51=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)

12:35:25 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x0)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:25 executing program 4:

12:35:25 executing program 0:

12:35:25 executing program 2:
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000)

12:35:25 executing program 5:

12:35:25 executing program 5:
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0'])

12:35:25 executing program 0:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

12:35:25 executing program 4:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
ioperm(0x0, 0xa674, 0x0)

12:35:25 executing program 2:
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000)

12:35:25 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x0)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:26 executing program 5:
eventfd2(0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f0000000100)='system\xdd\x00', 0x0)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000000200), 0x87)

12:35:28 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0)

12:35:28 executing program 2:
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000)

12:35:28 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(0x0, 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:28 executing program 0:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

12:35:28 executing program 4:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
ioperm(0x0, 0xa674, 0x0)

12:35:28 executing program 5:
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4)

12:35:28 executing program 2:
futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0)

12:35:28 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(0x0, 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

[  794.891003] kauditd_printk_skb: 63 callbacks suppressed
[  794.891011] audit: type=1400 audit(1569846928.832:12916): avc:  denied  { map } for  pid=22035 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=82988 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:35:28 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
ioperm(0x0, 0xa674, 0x0)

[  794.980198] audit: type=1400 audit(1569846928.902:12917): avc:  denied  { map } for  pid=22042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:29 executing program 2:
futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0)

[  795.193058] audit: type=1400 audit(1569846928.912:12918): avc:  denied  { map } for  pid=22042 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:29 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(0x0, 0x0, 0x0)
fchdir(r0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

[  795.354846] audit: type=1400 audit(1569846928.912:12919): avc:  denied  { map } for  pid=22042 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  795.419427] audit: type=1400 audit(1569846928.912:12920): avc:  denied  { map } for  pid=22042 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  795.443897] audit: type=1400 audit(1569846928.912:12921): avc:  denied  { map } for  pid=22042 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:29 executing program 2:
futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0)

[  795.490367] audit: type=1400 audit(1569846929.082:12922): avc:  denied  { map } for  pid=22046 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  795.517250] audit: type=1400 audit(1569846929.092:12923): avc:  denied  { map } for  pid=22046 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  795.576462] audit: type=1400 audit(1569846929.092:12924): avc:  denied  { map } for  pid=22046 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  795.660646] audit: type=1400 audit(1569846929.152:12925): avc:  denied  { map } for  pid=22046 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:31 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))

12:35:31 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f004})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

12:35:31 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:31 executing program 0:
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
clock_gettime(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0))
getegid()

12:35:31 executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x29, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a000000000704eb3014cd3ec8a755c1e1380081ffad000000e8d5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)

12:35:31 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
ioperm(0x0, 0xa674, 0x0)

12:35:31 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:32 executing program 4:

12:35:32 executing program 0:
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
clock_gettime(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0))
getegid()

12:35:32 executing program 2:

12:35:32 executing program 4:

12:35:32 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
creat(&(0x7f0000000000)='./bus\x00', 0x0)

12:35:34 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)

12:35:34 executing program 0:

12:35:34 executing program 2:

12:35:34 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
ioperm(0x0, 0xa674, 0x0)

12:35:34 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(0x0, 0x0)

12:35:34 executing program 4:

12:35:34 executing program 0:

12:35:34 executing program 4:

12:35:34 executing program 2:

12:35:35 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(0x0, 0x0)

[  801.034674] kauditd_printk_skb: 78 callbacks suppressed
[  801.034683] audit: type=1400 audit(1569846934.972:13004): avc:  denied  { map } for  pid=22106 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=83972 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:35:35 executing program 0:

12:35:35 executing program 2:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fcntl$getflags(r0, 0xb)

[  801.311021] audit: type=1400 audit(1569846935.062:13005): avc:  denied  { map } for  pid=22111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  801.509772] audit: type=1400 audit(1569846935.062:13006): avc:  denied  { map } for  pid=22111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  801.659611] audit: type=1400 audit(1569846935.062:13007): avc:  denied  { map } for  pid=22111 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  801.796793] audit: type=1400 audit(1569846935.092:13008): avc:  denied  { map } for  pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  801.896564] audit: type=1400 audit(1569846935.112:13009): avc:  denied  { map } for  pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  801.921386] audit: type=1400 audit(1569846935.132:13010): avc:  denied  { map } for  pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  801.947146] audit: type=1400 audit(1569846935.202:13011): avc:  denied  { map } for  pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  801.971947] audit: type=1400 audit(1569846935.222:13012): avc:  denied  { map } for  pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  802.015657] audit: type=1400 audit(1569846935.232:13013): avc:  denied  { map } for  pid=22115 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:37 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
r47 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)

12:35:37 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = getpgid(0x0)
wait4(r1, 0x0, 0x0, &(0x7f0000000080))

12:35:37 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
epoll_create(0x0)

12:35:37 executing program 1:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90)
r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
creat(0x0, 0x0)

12:35:37 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
statx(0xffffffffffffffff, 0x0, 0x7400, 0x0, 0x0)

12:35:37 executing program 2:
eventfd2(0x4, 0x801)
socket$inet_tcp(0x2, 0x1, 0x0)
mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4d401111f3535a95)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x3, 0x0, 0x9, 0x4000, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18d6a04c, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x4000, 0xffffffffffffffff, 0x0)
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0)
setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f0000000240))
openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0)
madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_team\x00', 0x410})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TUNSETLINK(r1, 0x400454cd, 0x339)
memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = memfd_create(&(0x7f0000000100)='system\xdd\x00', 0x0)
write(r3, &(0x7f0000002000)='/', 0x1)
sendfile(r3, r3, &(0x7f0000000200), 0x87)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r3, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0)

12:35:38 executing program 0:
syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x800}], 0x0, 0x0)

12:35:38 executing program 5:
futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
recvfrom$unix(0xffffffffffffffff, 0x0, 0xfffffffffffffe45, 0x0, 0x0, 0x0)
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
tkill(0x0, 0x0)
futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0)

12:35:38 executing program 4:
r0 = socket(0xa, 0x802, 0x88)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c)
r1 = socket$netlink(0x10, 0x3, 0x4)
writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1)

12:35:38 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x1100082)
r1 = memfd_create(&(0x7f0000000200)='/\xd2\a\xaa(\t0\xedj\\\x14E\x80VfM\'\x80\xb1\xce\x86Wp#\x00\xc2\xf8\x03\xb5\a\x9e\x83X\x8e?yE\xec\xeb2-\xbb\vO\xf9P\xd7\xd7\xf5\xa8\xaeW\x8e\xe5Q\xd9\x9ew\x8e}\x868\x9f2\xf9\x17\xf5\xf8;\xd5g\bQ\xf1a\x0e$9[k@\x0fj\x83\x9d\xb1\xd5\xd7\xa5\xc1\x05ox\xe4\xdc6\x04\xc1n\xf6\xf8\x1c\xf2\xa9\xbb\xbc\x12u\xfd\xeb0bK\xb8A\x93\xb3\x8co\a\xe1}R\xa6x\xde\xb5;\xea\xa0', 0x0)
ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, "fa71ca12880e1f75b87187a2ba4dc3bd55d4a462b92a2c00fd7a3cc5aaf45e6b009c302a027a305da4a7d9fc9a460de69e23f08fa809a983d071f25d38b1978c", "f83c0f2ca28b2f3829463149455e07669686a39606824f28df3ba53313827c00cc50afcfc638bb491fcec6565f4e658373ccfdaad198d9cf0acdf6c169d79921", "2e4fc451b270daa4892406454d95b940ecc1bc6e2586e7c90f1dcf80de938c00"})

12:35:38 executing program 0:
socket$inet6_tcp(0xa, 0x1, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
epoll_create(0x4001c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000))
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

12:35:38 executing program 2:
socket$inet6(0xa, 0x0, 0x6a9b)

12:35:40 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)

12:35:40 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800a1695e1dcfe87b1071")
r1 = socket(0x2000000011, 0x4000000000080002, 0x0)
sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x6}, 0x80, 0x0}}], 0x2, 0x0)

12:35:40 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r0 = getpid()
tkill(r0, 0x9)
r1 = socket$inet6(0xa, 0x40000000000001, 0x0)
bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
listen(r1, 0x0)
syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff)

12:35:40 executing program 4:
socket$netlink(0x10, 0x3, 0x0)
socket$alg(0x26, 0x5, 0x0)
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'})
r1 = socket(0x10, 0x800000000080002, 0x0)
getsockopt$netlink(r1, 0x10e, 0xc, 0x0, 0x0)
bind$packet(0xffffffffffffffff, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x0, 0x0)
writev(0xffffffffffffffff, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10)
setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x81}, 0x8)
socket$nl_route(0x10, 0x3, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0)
socket$packet(0x11, 0x0, 0x300)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
bind$packet(0xffffffffffffffff, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
pipe(0x0)
socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0xc0045878, 0x0)
pipe(0x0)
setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0)
ioctl$int_in(r2, 0x5421, &(0x7f0000000180)=0x7fff)
sendto$inet(r2, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10)
sendto$inet(r2, &(0x7f0000000380)="9d", 0x1, 0xfffffffffffffffe, 0x0, 0x0)
close(r2)

12:35:40 executing program 2:
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xffffffffffffffee, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000140001090001000200000000021000e11800000014000200fe8800a00fa10002000000000000a993"], 0x2c}}, 0x0)
r0 = socket(0x1000000010, 0x80003, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
sendmmsg$alg(r0, &(0x7f0000000100), 0x4924924924926ed, 0x0)

12:35:40 executing program 0:
r0 = socket(0x2000000011, 0x4000000000080002, 0x0)
sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x608}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x6}, 0x80, 0x0}}], 0x2, 0x0)

[  807.087268] kauditd_printk_skb: 92 callbacks suppressed
[  807.087277] audit: type=1400 audit(1569846941.022:13106): avc:  denied  { map } for  pid=22181 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84109 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:35:41 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', <r1=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="7c0000002400070900002389f0d20ddab6f10000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000e0007000000080001007366710048000200"/100], 0x7c}}, 0x0)
r3 = socket(0x10, 0x80002, 0x0)
sendmmsg$alg(r3, &(0x7f0000000140)=[{0x3, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000000)}], 0x9249249249249e1, 0x0)

12:35:41 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x7)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20)
setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c)

[  807.136652] audit: type=1400 audit(1569846941.032:13107): avc:  denied  { create } for  pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:35:41 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000880)="9dd00e1de00d9b709036d1b45f3f8890a8f4ea94ae6848920610c0bcfd615f64f6bc124acd6624508f178612c33da2795a84d48f78cd5c4e5017725ac45a46d9475d4d387404b089347c31834e3a896d646ee695c7365a272b83082a2a54ce308257c1b3ad8326de4684336648acd9146a999cdbfe8ca35d1ff67b79ffaf6350427611dcbba9f40bb1311f63749bd77f304b80162132ffa9aa5a6a42f4d9d735cf5fbb62b95b5022ff321e80b5f0fea25c718212b45376616f92", 0xfffffffffffffedb, 0x0)

12:35:41 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e)

[  807.250308] audit: type=1400 audit(1569846941.032:13108): avc:  denied  { write } for  pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:35:41 executing program 4:

[  807.330275] audit: type=1400 audit(1569846941.042:13109): avc:  denied  { map } for  pid=22184 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  807.460380] audit: type=1400 audit(1569846941.052:13110): avc:  denied  { read } for  pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:35:41 executing program 5:

[  807.633493] audit: type=1400 audit(1569846941.152:13111): avc:  denied  { create } for  pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  807.743441] audit: type=1400 audit(1569846941.152:13112): avc:  denied  { write } for  pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  807.902716] audit: type=1400 audit(1569846941.182:13113): avc:  denied  { map } for  pid=22189 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  808.027563] audit: type=1400 audit(1569846941.182:13114): avc:  denied  { map } for  pid=22189 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  808.103187] audit: type=1400 audit(1569846941.212:13115): avc:  denied  { map } for  pid=22189 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:44 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400))

12:35:44 executing program 2:

12:35:44 executing program 0:

12:35:44 executing program 1:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_GET_KEEPCAPS(0x7)

12:35:44 executing program 4:
r0 = socket$inet6(0xa, 0x3, 0x100000400000003a)
setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0)

12:35:44 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf)

12:35:44 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0)
fallocate(r1, 0x0, 0xffff, 0x110003)
write$cgroup_int(r1, &(0x7f0000000040), 0x12)
lseek(r1, 0x0, 0x3)

12:35:44 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x40800, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)

12:35:44 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendmmsg$inet(r0, &(0x7f0000000700)=[{{&(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x18}}], 0x1, 0x0)

12:35:44 executing program 5:
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb202000000000000, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0)

12:35:44 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x400000036)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xd, 0x869, 0x1f})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

12:35:44 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c)
socket$inet6(0xa, 0x1000000000002, 0x0)
pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="bdad222e7bf671beeacbc8338e32b4ab41a79d47ca361898f52d6dd76f2cf62461f9c061c9e907796168e49ba4ab", 0x2e}], 0x1, 0x0)
listen(r0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = socket$inet6(0xa, 0x4, 0x0)
connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c)
setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000100), 0x4)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c)
sendmmsg(r2, &(0x7f0000005040), 0x15f, 0x0)
r3 = inotify_init()
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r4=>0xffffffffffffffff})
openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
r5 = dup2(r2, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
poll(&(0x7f00000000c0)=[{r2}, {r3}, {r5}], 0x3, 0x0)
accept$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0003000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
socket$inet6(0xa, 0x3, 0x0)

12:35:47 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)

12:35:47 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
r3 = socket$netlink(0x10, 0x3, 0x0)
sendfile(r3, r2, 0x0, 0x4000000000dc)

12:35:47 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, &(0x7f0000000180))

12:35:47 executing program 5:
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}})

12:35:47 executing program 0:
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xffffffffffffffee, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000140001090001000200000000021000e11800000014000200fe8800a00fa10002000000000000a993"], 0x2c}}, 0x0)
r0 = socket(0x1000000010, 0x80003, 0x0)
sendmmsg$alg(r0, &(0x7f0000000100), 0x4924924924926ed, 0x0)

[  813.220277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8300 sclass=netlink_route_socket pig=22258 comm=syz-executor.4
[  813.254416] kauditd_printk_skb: 91 callbacks suppressed
12:35:47 executing program 5:
accept$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
ioctl(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$inet6(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390014000800020000dc1338d54400009b7a136ef75afb83de448daa70540d8102d2c55327c43ab8220000060cec4fab91d400000000000000", 0x55}], 0x1}, 0x0)

12:35:47 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', <r2=>0x0})
sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x24, 0x8, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0)

12:35:47 executing program 0:
socket$netlink(0x10, 0x3, 0x0)
socket$alg(0x26, 0x5, 0x0)
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'})
r1 = socket(0x10, 0x800000000080002, 0x0)
getsockopt$netlink(r1, 0x10e, 0xc, &(0x7f00000000c0)=""/24, &(0x7f00000001c0)=0x18)
bind$packet(0xffffffffffffffff, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
writev(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10)
setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x81}, 0x8)
socket$nl_route(0x10, 0x3, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0)
socket$packet(0x11, 0x0, 0x300)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
bind$packet(0xffffffffffffffff, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
pipe(0x0)
socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0xc0045878, 0x0)
pipe(0x0)
setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0)
ioctl$int_in(r3, 0x5421, &(0x7f0000000180)=0x7fff)
sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10)
sendto$inet(r3, &(0x7f0000000380)="9d", 0x1, 0xfffffffffffffffe, 0x0, 0x0)
close(r3)

[  813.254426] audit: type=1400 audit(1569846947.192:13207): avc:  denied  { map } for  pid=22261 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=83363 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:35:47 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
r3 = socket$netlink(0x10, 0x3, 0x0)
sendfile(r3, r2, 0x0, 0x4000000000dc)

[  813.371769] audit: type=1400 audit(1569846947.292:13208): avc:  denied  { map } for  pid=22269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:47 executing program 5:
pipe(&(0x7f00000001c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x140000914, 0x4)
setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4)
setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10)
connect(r2, &(0x7f0000000240)=@generic={0x2, "066aa30e5d3ae33288082f8f947a065da8a9df185cc56bc519ba5e00b5fb68aa3fcbc376b1c706f7638adf98ca9f964ff373a58d39ef8ebfc2f5056c18e0551ea9ed334cffc4447c0665be285c8f049aa3ad8fbdf40bd27723eac7a76acb4504bfcc8ddb342002160fa043838caa9452c8f86f30dc169dc28dcb83c83cde"}, 0x80)
setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

[  813.506802] audit: type=1400 audit(1569846947.292:13209): avc:  denied  { map } for  pid=22269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:47 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r1 = socket$inet(0x2, 0x200000002, 0x0)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='bridge_slave_0\x00', 0x10)
connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10)

12:35:47 executing program 2:

[  813.631448] audit: type=1400 audit(1569846947.292:13210): avc:  denied  { map } for  pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  813.750125] protocol 88fb is buggy, dev hsr_slave_0
[  813.755309] protocol 88fb is buggy, dev hsr_slave_1
[  813.816678] audit: type=1400 audit(1569846947.292:13211): avc:  denied  { map } for  pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  813.840779] protocol 88fb is buggy, dev hsr_slave_0
[  813.840827] protocol 88fb is buggy, dev hsr_slave_1
[  813.873120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8300 sclass=netlink_route_socket pig=22284 comm=syz-executor.4
[  813.994094] audit: type=1400 audit(1569846947.302:13212): avc:  denied  { map } for  pid=22269 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  814.137350] audit: type=1400 audit(1569846947.302:13213): avc:  denied  { map } for  pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  814.305788] audit: type=1400 audit(1569846947.302:13214): avc:  denied  { map } for  pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  814.399072] audit: type=1400 audit(1569846947.332:13215): avc:  denied  { map } for  pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  814.464868] audit: type=1400 audit(1569846947.342:13216): avc:  denied  { map } for  pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:50 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r42=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r43=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r44=>0x0})
getresgid(&(0x7f0000000c00)=<r45=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)

12:35:50 executing program 5:

12:35:50 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
r3 = socket$netlink(0x10, 0x3, 0x0)
sendfile(r3, r2, 0x0, 0x4000000000dc)

12:35:50 executing program 1:

12:35:50 executing program 0:

12:35:50 executing program 2:

12:35:50 executing program 1:

12:35:50 executing program 0:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000040)=0x66)

12:35:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
sysinfo(&(0x7f0000000040)=""/237)

12:35:50 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5e0bcfe47bf070")
ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0)
prctl$PR_GET_SECCOMP(0x15)

[  816.387592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8300 sclass=netlink_route_socket pig=22303 comm=syz-executor.4
12:35:50 executing program 4:
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0)
chdir(&(0x7f0000000380)='./file0\x00')
rmdir(&(0x7f0000000100)='./file0\x00')

12:35:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0)

12:35:53 executing program 2:
sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\b\x00\x00', @ANYBLOB="000127bd7000fddbdf251100000058000100080001000a000000080073cb7d95f9aadf3108e9c404004e2100000800060072720000fbff00000a00000014000300fe7a73c80242e097109a12f70225443dd08800000000000000efffffffff000108000bdbadb6cf036deb11b498fc25193b108449e62e6d0f99bcbf0a26"], 0x2}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0x202000, 0xe2)
openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4000, 0x40)
setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0)=@gcm_128={{0x303}, "6626219d9cb2bf60", "1e140d4d613c5b3fe8697c12d41ac347", "418ff744", "ae6523c59735c731"}, 0x28)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f)
shutdown(0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8d}, 0x28240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f00000000c0)='./file0\x00', 0x4004, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x80)
mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0)
chdir(&(0x7f0000000380)='./file0\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
rmdir(&(0x7f0000000100)='./file0\x00')

12:35:53 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5e0bcfe47bf070")
prctl$PR_SET_PDEATHSIG(0x1, 0x0)

12:35:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)

12:35:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
timer_create(0x0, 0x0, &(0x7f00000003c0))
timer_gettime(0x0, &(0x7f0000000540))

12:35:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
pause()

12:35:53 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0)

[  819.352399] kauditd_printk_skb: 103 callbacks suppressed
[  819.352408] audit: type=1326 audit(1569846953.292:13320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22334 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000
12:35:53 executing program 4:
sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\b\x00\x00', @ANYRES16, @ANYBLOB="000127bd7000fddbdf251100000058000100080001000a000000080073cb7d95f9aadf3108e9c404004e2100000800060072720000fbff00000a00000014000300fe7a73c80242e097109a12f70225443dd08800000000000000efffffffff000108000bdbadb6cf036deb11b498fc25193b108449e62e6d0f99bcbf0a26"], 0x3}}, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0x202000, 0xe2)
openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4000, 0x40)
r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000003c0)=@gcm_128={{0x303}, "6626219d9cb2bf60", "1e140d4d613c5b3fe8697c12d41ac347", "418ff744", "ae6523c59735c731"}, 0x28)
sendfile(0xffffffffffffffff, r0, 0x0, 0x320f)
r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
shutdown(r1, 0x0)
perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfffffffffffffffd, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8d}, 0x28240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f00000000c0)='./file0\x00', 0x4004, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x80)
mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0)
chdir(&(0x7f0000000380)='./file0\x00')
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bpq0\x00'})
getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000500)={'\x99\x858\xd5te\x00\x00\x00\x00\x00\x00\xd5\xfd\xe6\x17\xd3\x92\x7f\xb7\xebs\x1f\x9az\x00', 0x0, 0x3, 0xde, [], 0x4, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000400)=""/222}, 0x0)
rmdir(&(0x7f0000000100)='./file0\x00')

[  819.446085] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem
[  819.466067] EXT4-fs (loop2): bad geometry: block count 2305844108725322808 exceeds size of device (66048 blocks)
[  819.514592] audit: type=1326 audit(1569846953.332:13321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22332 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000
[  819.570417] audit: type=1326 audit(1569846953.362:13322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22335 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000
12:35:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
lgetxattr(0x0, 0x0, 0x0, 0x0)

[  819.615055] audit: type=1400 audit(1569846953.432:13323): avc:  denied  { map } for  pid=22346 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=83492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  819.722813] audit: type=1400 audit(1569846953.432:13324): avc:  denied  { map } for  pid=22349 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  819.751482] audit: type=1400 audit(1569846953.432:13325): avc:  denied  { map } for  pid=22349 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  819.775602] audit: type=1400 audit(1569846953.452:13326): avc:  denied  { map } for  pid=22349 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  819.802530] audit: type=1400 audit(1569846953.452:13327): avc:  denied  { map } for  pid=22349 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  819.828506] audit: type=1400 audit(1569846953.452:13328): avc:  denied  { map } for  pid=22349 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:53 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x1e00, 0x0, 0x0, "dd1ecb941de598e32b581d85f96cad4f38c4db"})

[  819.859569] audit: type=1400 audit(1569846953.542:13329): avc:  denied  { map } for  pid=22351 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:53 executing program 4:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout_data(r0, 0x107, 0x9, &(0x7f00000000c0)={0x0, 0x0}, 0x8)

12:35:54 executing program 4:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6}, 0x4)
setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8)

12:35:54 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000240)={[{@xino_on='xino=on'}, {@nfs_export_on='nfs_export=on'}], [{@euid_gt={'euid>'}}]})
getrandom(0x0, 0x0, 0x0)

[  820.313548] overlayfs: unrecognized mount option "xino=on" or missing value
12:35:56 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))

12:35:56 executing program 5:
pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240)={&(0x7f0000000200), 0xffffffffffffff71})

12:35:56 executing program 4:
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
ftruncate(r0, 0x8003f1)
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, 0x0)
r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0))
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff})
ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0)
getpgrp(0x0)

12:35:56 executing program 0:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout_data(r0, 0x107, 0x17, 0x0, 0x0)

12:35:56 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_GET_DUMPABLE(0x3)

12:35:56 executing program 2:
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
ftruncate(r0, 0x8003f1)
r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0))
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff})

12:35:56 executing program 5:
syz_open_dev$sndseq(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
ftruncate(r0, 0x8003f1)
r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0))
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff})

12:35:56 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioprio_set$uid(0x0, 0x0, 0x0)

12:35:56 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioprio_set$uid(0x0, 0x0, 0x0)

12:35:56 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioprio_set$uid(0x0, 0x0, 0x0)

12:35:56 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x81, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8)
setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000040)=0x6, 0x4)
r3 = accept4(r1, 0x0, &(0x7f0000000300), 0x800)
setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000340)={0xfff, {{0x2, 0x4e24, @rand_addr=0x401}}}, 0x88)
r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x881, 0x0)
mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x80100, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
unlink(&(0x7f0000000000)='./file0\x00')
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0)
r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x201, 0x0)
write$P9_RCLUNK(r5, &(0x7f0000000280)={0x7, 0x79, 0x1}, 0x7)
accept(r1, 0x0, 0x0)
mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000006, 0x8013, r4, 0x0)

12:35:56 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet6(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0)

12:35:59 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioprio_set$uid(0x0, 0x0, 0x0)

12:35:59 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8)
bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x2}, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10)
sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0)
close(r0)

12:35:59 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)

12:35:59 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00')
r1 = socket$netlink(0x10, 0x3, 0x0)
dup2(r1, r0)

12:35:59 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0)
r2 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', <r3=>0x0})
bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14)
dup3(r1, r2, 0x0)
bind$packet(0xffffffffffffffff, 0x0, 0x0)
ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0)

12:35:59 executing program 5:
syz_emit_ethernet(0x5e, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x28, 0x40000000003a, 0x43ff, @ipv4={[], [], @broadcast}, @local, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, [], @mcast2, @local}}}}}}, 0x0)

12:35:59 executing program 5:

12:35:59 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioprio_set$uid(0x0, 0x0, 0x0)

12:35:59 executing program 2:

12:35:59 executing program 5:

[  825.659864] kauditd_printk_skb: 125 callbacks suppressed
[  825.659874] audit: type=1400 audit(1569846959.592:13455): avc:  denied  { map } for  pid=22445 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84493 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  825.750777] audit: type=1400 audit(1569846959.672:13456): avc:  denied  { map } for  pid=22451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:59 executing program 4:

12:35:59 executing program 5:

[  825.860290] audit: type=1400 audit(1569846959.672:13457): avc:  denied  { map } for  pid=22451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  825.896645] audit: type=1400 audit(1569846959.672:13458): avc:  denied  { map } for  pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:35:59 executing program 2:

[  825.997848] audit: type=1400 audit(1569846959.672:13459): avc:  denied  { map } for  pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  826.136390] audit: type=1400 audit(1569846959.672:13460): avc:  denied  { map } for  pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  826.187333] audit: type=1400 audit(1569846959.672:13461): avc:  denied  { map } for  pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  826.219008] audit: type=1400 audit(1569846959.682:13462): avc:  denied  { map } for  pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  826.253716] audit: type=1400 audit(1569846959.682:13463): avc:  denied  { map } for  pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  826.286022] audit: type=1400 audit(1569846959.682:13464): avc:  denied  { map } for  pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0)

12:36:02 executing program 1:

12:36:02 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
timer_getoverrun(0x0)

12:36:02 executing program 2:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
open(0x0, 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c)
clock_gettime(0x0, &(0x7f0000002ac0)={0x0, <r2=>0x0})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180))
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002b00)={0x0, r2+10000000})
ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000002b40)={@loopback, 0x80})
sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@ll={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)="b98b71fe34dfb4724fe9e9a353649a9f41b1b039331ad7", 0x17}], 0x1}, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
add_key(0x0, 0x0, &(0x7f0000001180), 0x0, 0xfffffffffffffffe)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0)
write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38)
perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0)
r4 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0)
lstat(0x0, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r4, 0x0)
rename(&(0x7f0000000440)='./bus/file0\x00', 0x0)
timer_gettime(0x0, 0x0)
ppoll(0x0, 0x0, 0x0, 0x0, 0x0)

12:36:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
keyctl$session_to_parent(0x12)

12:36:02 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
r41 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)

12:36:02 executing program 1:
sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16, @ANYBLOB="000127bd7000fddbdf251100000058000100080001000a000000080004004e2100000800060072720000080001000a00000014000300fe88000000000000000000000000010108000b007369700008000b007369700008000b0073"], 0x3}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0)

[  828.707115] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it!
12:36:02 executing program 4:

12:36:02 executing program 4:

12:36:03 executing program 4:

[  829.085970] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities
12:36:03 executing program 1:

12:36:03 executing program 1:

12:36:03 executing program 5:

12:36:03 executing program 4:

12:36:03 executing program 1:

12:36:03 executing program 2:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
open(0x0, 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c)
clock_gettime(0x0, &(0x7f0000002ac0)={0x0, <r2=>0x0})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180))
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002b00)={0x0, r2+10000000})
ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000002b40)={@loopback, 0x80})
sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@ll={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)="b98b71fe34dfb4724fe9e9a353649a9f41b1b039331ad7", 0x17}], 0x1}, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
add_key(0x0, 0x0, &(0x7f0000001180), 0x0, 0xfffffffffffffffe)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0)
write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38)
perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0)
r4 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0)
lstat(0x0, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r4, 0x0)
rename(&(0x7f0000000440)='./bus/file0\x00', 0x0)
timer_gettime(0x0, 0x0)
ppoll(0x0, 0x0, 0x0, 0x0, 0x0)

12:36:03 executing program 0:

[  830.662701] kauditd_printk_skb: 77 callbacks suppressed
[  830.662709] audit: type=1400 audit(1569846964.602:13542): avc:  denied  { map } for  pid=22515 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  830.691489] audit: type=1400 audit(1569846964.602:13543): avc:  denied  { map } for  pid=22515 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:05 executing program 4:

12:36:05 executing program 1:

12:36:05 executing program 5:

12:36:05 executing program 0:

12:36:05 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))
dup(0xffffffffffffffff)

12:36:05 executing program 2:

12:36:05 executing program 5:

12:36:05 executing program 0:

12:36:05 executing program 1:

12:36:05 executing program 4:

12:36:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]})
readahead(0xffffffffffffffff, 0x0, 0x0)

12:36:05 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r1, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x2b}}}, 0xe8)
sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[  831.883297] audit: type=1400 audit(1569846965.822:13544): avc:  denied  { map } for  pid=22521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  832.003499] audit: type=1400 audit(1569846965.822:13545): avc:  denied  { map } for  pid=22521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:06 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000040))

12:36:06 executing program 1:
pkey_alloc(0x0, 0x5)

[  832.149793] audit: type=1400 audit(1569846965.822:13546): avc:  denied  { map } for  pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  832.279937] audit: type=1400 audit(1569846965.822:13547): avc:  denied  { map } for  pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:06 executing program 4:
io_setup(0x0, &(0x7f0000000440))

[  832.446882] audit: type=1400 audit(1569846965.852:13548): avc:  denied  { map } for  pid=22521 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:06 executing program 0:

[  832.605243] audit: type=1400 audit(1569846965.862:13549): avc:  denied  { map } for  pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  832.731796] audit: type=1400 audit(1569846965.872:13550): avc:  denied  { map } for  pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  832.855405] audit: type=1400 audit(1569846965.892:13551): avc:  denied  { map } for  pid=22522 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84641 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:36:08 executing program 5:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dca5055e0bcf")
sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28)
sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b)

12:36:08 executing program 1:
keyctl$chown(0x12, 0x0, 0xee00, 0x0)

12:36:08 executing program 4:
r0 = socket$inet(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0)

12:36:08 executing program 0:
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0xc000, 0x0)

12:36:08 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400))

12:36:08 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

12:36:08 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
write$binfmt_misc(r0, 0x0, 0x0)

12:36:08 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

[  834.890566] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
12:36:08 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
sendfile(r0, r1, 0x0, 0x0)

12:36:08 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r1, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0)

12:36:09 executing program 1:
r0 = socket$inet(0x2, 0x1, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000100)=0xc)
r2 = socket$inet(0x2, 0x1, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, <r3=>0x0}, &(0x7f0000000100)=0xc)
setresgid(0x0, r1, r3)

12:36:09 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

[  835.670604] kauditd_printk_skb: 108 callbacks suppressed
[  835.670613] audit: type=1400 audit(1569846969.612:13660): avc:  denied  { create } for  pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:36:09 executing program 5:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dca5055e0bcf")
sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28)
sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b)

12:36:09 executing program 0:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$RTC_AIE_ON(r0, 0x7001)

12:36:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070")
creat(&(0x7f00000001c0)='./bus\x00', 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)

[  835.862156] audit: type=1400 audit(1569846969.642:13661): avc:  denied  { create } for  pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:36:09 executing program 1:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dca5055e0bcf")
sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28)
sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b)

[  836.010099] audit: type=1400 audit(1569846969.642:13662): avc:  denied  { write } for  pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  836.107574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  836.206012] audit: type=1400 audit(1569846969.652:13663): avc:  denied  { write } for  pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  836.278015] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  836.413120] audit: type=1400 audit(1569846969.762:13664): avc:  denied  { map } for  pid=22579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  836.545741] audit: type=1400 audit(1569846969.782:13665): avc:  denied  { map } for  pid=22579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  836.623791] audit: type=1400 audit(1569846969.792:13666): avc:  denied  { map } for  pid=22579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  836.655918] audit: type=1400 audit(1569846969.802:13667): avc:  denied  { map } for  pid=22579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  836.710198] audit: type=1400 audit(1569846969.842:13668): avc:  denied  { map } for  pid=22579 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  836.746318] audit: type=1400 audit(1569846969.842:13669): avc:  denied  { map } for  pid=22579 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:11 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

12:36:11 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x26, 0x0, 0x0)

12:36:11 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)
openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)

12:36:11 executing program 4:
syz_genetlink_get_family_id$ipvs(0x0)

12:36:11 executing program 1:
semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/203)

12:36:11 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc)

12:36:11 executing program 0:
r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)="fe", 0x1, 0xfffffffffffffffd)
keyctl$chown(0x11, r0, 0xee00, 0x0)

12:36:11 executing program 2:
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

12:36:11 executing program 1:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r3, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4}}, 0xe8)
sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0)

12:36:12 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

12:36:12 executing program 2:
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

12:36:12 executing program 0:

12:36:12 executing program 4:
r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020000009, 0x7ff0bdbe})
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)
ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0)
syz_open_dev$usb(0x0, 0x0, 0x0)
openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0)

12:36:12 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r2, &(0x7f00000027c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x3a)

[  838.914714] vhci_hcd: default hub control req: 0000 v0000 i0000 l2304
12:36:14 executing program 0:
capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000080)={0x615})

12:36:14 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000f1ff000000"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0)

12:36:14 executing program 2:
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

12:36:14 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pkey_alloc(0x0, 0x0)
pkey_free(0xffffffffffffffff)

12:36:14 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
r39 = gettid()
tkill(r39, 0x1000000000016)

12:36:14 executing program 5:

12:36:15 executing program 5:

12:36:15 executing program 2:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

12:36:15 executing program 0:

12:36:15 executing program 4:

12:36:15 executing program 1:

[  841.206378] kauditd_printk_skb: 117 callbacks suppressed
[  841.206387] audit: type=1400 audit(1569846975.142:13787): avc:  denied  { map } for  pid=22651 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84829 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:36:15 executing program 5:

12:36:15 executing program 0:

12:36:15 executing program 2:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

[  841.387230] audit: type=1400 audit(1569846975.252:13788): avc:  denied  { map } for  pid=22655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:15 executing program 1:

12:36:15 executing program 4:

[  841.559303] audit: type=1400 audit(1569846975.252:13789): avc:  denied  { map } for  pid=22655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  841.685788] audit: type=1400 audit(1569846975.262:13790): avc:  denied  { map } for  pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  841.828955] audit: type=1400 audit(1569846975.262:13791): avc:  denied  { map } for  pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  841.984524] audit: type=1400 audit(1569846975.272:13792): avc:  denied  { map } for  pid=22655 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  842.086204] audit: type=1400 audit(1569846975.282:13793): avc:  denied  { map } for  pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  842.193277] audit: type=1400 audit(1569846975.302:13794): avc:  denied  { map } for  pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  842.224633] audit: type=1400 audit(1569846975.312:13795): avc:  denied  { map } for  pid=22660 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  842.247512] audit: type=1400 audit(1569846975.312:13796): avc:  denied  { map } for  pid=22660 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:18 executing program 0:

12:36:18 executing program 5:

12:36:18 executing program 2:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68)

12:36:18 executing program 1:

12:36:18 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)
gettid()

12:36:18 executing program 4:

12:36:18 executing program 5:

12:36:18 executing program 0:

12:36:18 executing program 4:

12:36:18 executing program 1:

12:36:18 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0)

12:36:18 executing program 5:

12:36:18 executing program 0:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0)
fallocate(r0, 0x11, 0x0, 0x9000000)

12:36:18 executing program 4:
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000)

12:36:18 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0)

12:36:18 executing program 1:
mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
readlink(&(0x7f00000005c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)=""/113, 0x71)

12:36:21 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc)

12:36:21 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0)

12:36:21 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newsa={0xf0, 0x1a, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}}, @in6=@ipv4}}, 0xf0}}, 0x0)

12:36:21 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ustat(0x9, 0x0)

12:36:21 executing program 1:
openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0)
r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
io_setup(0x8, &(0x7f0000000180)=<r1=>0x0)
io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}])
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0)
fallocate(r3, 0x1, 0x0, 0x2af005a3)
r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080))
r5 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0)
fallocate(r5, 0x1, 0x0, 0x2af005a3)

12:36:21 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:21 executing program 5:
sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:21 executing program 2:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='u'], 0x1)
fallocate(r0, 0x3, 0x0, 0x8020003)

[  847.455148] kauditd_printk_skb: 113 callbacks suppressed
[  847.455156] audit: type=1400 audit(1569846981.392:13910): avc:  denied  { map } for  pid=22722 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=85203 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:36:21 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
getpeername$netlink(r0, 0x0, &(0x7f0000000040))

12:36:21 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  847.547973] audit: type=1804 audit(1569846981.412:13911): pid=22720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1
12:36:21 executing program 5:
sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:21 executing program 1:
prctl$PR_SET_SECUREBITS(0x1c, 0x1)
r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0)
execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000)

[  847.745095] audit: type=1804 audit(1569846981.422:13912): pid=22720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1
[  847.908370] audit: type=1804 audit(1569846981.532:13913): pid=22720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1
[  848.084055] audit: type=1804 audit(1569846981.532:13914): pid=22729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1
[  848.270134] audit: type=1804 audit(1569846981.542:13915): pid=22731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1
[  848.403114] audit: type=1400 audit(1569846981.632:13916): avc:  denied  { map } for  pid=22733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  848.435631] audit: type=1400 audit(1569846981.642:13917): avc:  denied  { map } for  pid=22733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  848.466704] audit: type=1400 audit(1569846981.642:13918): avc:  denied  { map } for  pid=22733 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  848.498047] audit: type=1400 audit(1569846981.652:13920): avc:  denied  { map } for  pid=22733 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:24 executing program 2:
r0 = socket$inet(0x2, 0x3, 0x2)
fcntl$lock(r0, 0x24, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff})

12:36:24 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newlink={0x34, 0x11, 0xe3b, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_team\x00'}]}, 0x34}}, 0x0)

12:36:24 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:24 executing program 5:
sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:24 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40))

12:36:24 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff, @mcast2, 0x10000}, 0x1c)
socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000100))
r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x14, 0x16, 0x400000000000005, 0x0, 0x0, {0x2}}, 0x14}}, 0x0)
dup2(r2, r1)
r3 = socket(0x10, 0x3, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r4 = socket$caif_stream(0x25, 0x1, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000016000500000000000000000200000000"], 0x14}}, 0x0)
r7 = dup2(r6, r5)
r8 = socket(0x10, 0x3, 0x0)
r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, r9, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40)
sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r9, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081)
sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000001780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x70, r9, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x400}, 0x0)
ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000005c0)=<r10=>0x0)
perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r4)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r11 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_int(r11, 0x0, 0x1f, &(0x7f0000000200), 0x127)
openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0)
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0)
clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0)
utimes(&(0x7f00000000c0)='./file0\x00', 0x0)
r12 = socket$nl_generic(0x10, 0x3, 0x10)
r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r12, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r13, 0xc00, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040018}, 0x10)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, 0x0, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40)
sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, 0x0, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081)

12:36:24 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  850.492551] device team_slave_0 left promiscuous mode
[  850.542784] team0: Port device team_slave_0 removed
12:36:24 executing program 2:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_adjtime(0x0, 0x0)
ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, 0x0)
getgroups(0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
getresuid(0x0, 0x0, 0x0)
bind$unix(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x3, 0x1, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil})

[  850.630315] protocol 88fb is buggy, dev hsr_slave_0
[  850.635443] protocol 88fb is buggy, dev hsr_slave_1
12:36:24 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newlink={0x34, 0x11, 0xe3b, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_team\x00'}]}, 0x34}}, 0x0)

[  850.678374] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32
[  850.738653] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32
12:36:24 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000002, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de4538700000000e8904667033a61edb75c8d51c05dfaf7f4fdb16e0ca700", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f900040000b8a7"})

12:36:24 executing program 4:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:24 executing program 5:
sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  850.950115] protocol 88fb is buggy, dev hsr_slave_0
[  850.955270] protocol 88fb is buggy, dev hsr_slave_1
12:36:24 executing program 2:
setregid(0xee00, 0x0)
setregid(0x0, 0x0)

[  851.190140] protocol 88fb is buggy, dev hsr_slave_0
[  851.195315] protocol 88fb is buggy, dev hsr_slave_1
[  851.270112] protocol 88fb is buggy, dev hsr_slave_0
[  851.284780] protocol 88fb is buggy, dev hsr_slave_1
12:36:25 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff, @mcast2, 0x10000}, 0x1c)
socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000100))
r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x14, 0x16, 0x400000000000005, 0x0, 0x0, {0x2}}, 0x14}}, 0x0)
dup2(r2, r1)
r3 = socket(0x10, 0x3, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r4 = socket$caif_stream(0x25, 0x1, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000016000500000000000000000200000000"], 0x14}}, 0x0)
r7 = dup2(r6, r5)
r8 = socket(0x10, 0x3, 0x0)
r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, r9, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40)
sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r9, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081)
sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000001780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x70, r9, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x400}, 0x0)
ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000005c0)=<r10=>0x0)
perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r4)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r11 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_int(r11, 0x0, 0x1f, &(0x7f0000000200), 0x127)
openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0)
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0)
clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0)
utimes(&(0x7f00000000c0)='./file0\x00', 0x0)
r12 = socket$nl_generic(0x10, 0x3, 0x10)
r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r12, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r13, 0xc00, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040018}, 0x10)
r14 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00')
sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r14, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081)

12:36:25 executing program 1:

12:36:25 executing program 4:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  852.117419] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32
[  852.230161] protocol 88fb is buggy, dev hsr_slave_0
[  852.235383] protocol 88fb is buggy, dev hsr_slave_1
12:36:27 executing program 2:

12:36:27 executing program 5:
sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:27 executing program 1:

12:36:27 executing program 4:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:27 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0))

12:36:27 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff, @mcast2, 0x10000}, 0x1c)
socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000100))
r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x14, 0x16, 0x400000000000005, 0x0, 0x0, {0x2}}, 0x14}}, 0x0)
dup2(r2, r1)
r3 = socket(0x10, 0x3, 0x0)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r4 = socket$caif_stream(0x25, 0x1, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000016000500000000000000000200000000"], 0x14}}, 0x0)
r7 = dup2(r6, r5)
r8 = socket(0x10, 0x3, 0x0)
r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, r9, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40)
sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r9, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081)
sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000001780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x70, r9, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x400}, 0x0)
ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000005c0)=<r10=>0x0)
perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r4)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r11 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_int(r11, 0x0, 0x1f, &(0x7f0000000200), 0x127)
openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0)
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0)
clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0)
utimes(&(0x7f00000000c0)='./file0\x00', 0x0)
r12 = socket$nl_generic(0x10, 0x3, 0x10)
r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r12, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r13, 0xc00, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040018}, 0x10)
r14 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00')
sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r14, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081)

12:36:27 executing program 5:
sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:27 executing program 2:

12:36:27 executing program 1:

[  853.559719] kauditd_printk_skb: 127 callbacks suppressed
[  853.559728] audit: type=1400 audit(1569846987.492:14047): avc:  denied  { create } for  pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
12:36:27 executing program 4:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:27 executing program 5:
sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  853.681695] audit: type=1400 audit(1569846987.622:14048): avc:  denied  { map } for  pid=22815 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=85318 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:36:27 executing program 2:

[  853.788103] audit: type=1400 audit(1569846987.642:14049): avc:  denied  { create } for  pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  853.904619] audit: type=1400 audit(1569846987.652:14050): avc:  denied  { write } for  pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  853.948877] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32
12:36:27 executing program 1:

12:36:27 executing program 0:

12:36:28 executing program 4:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:28 executing program 2:

[  854.081517] audit: type=1400 audit(1569846987.682:14051): avc:  denied  { create } for  pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  854.230143] audit: type=1400 audit(1569846987.682:14052): avc:  denied  { write } for  pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  854.370957] audit: type=1400 audit(1569846987.682:14053): avc:  denied  { read } for  pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  854.520252] audit: type=1400 audit(1569846987.762:14054): avc:  denied  { map } for  pid=22822 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  854.554939] audit: type=1400 audit(1569846987.802:14055): avc:  denied  { map } for  pid=22822 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  854.578201] audit: type=1400 audit(1569846987.802:14056): avc:  denied  { map } for  pid=22822 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  856.390158] net_ratelimit: 22 callbacks suppressed
[  856.395158] protocol 88fb is buggy, dev hsr_slave_0
[  856.400252] protocol 88fb is buggy, dev hsr_slave_1
[  856.405362] protocol 88fb is buggy, dev hsr_slave_0
[  856.410434] protocol 88fb is buggy, dev hsr_slave_1
12:36:30 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)

12:36:30 executing program 2:

12:36:30 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c8"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:30 executing program 0:

12:36:30 executing program 4:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:30 executing program 1:

12:36:30 executing program 2:
unshare(0x20000400)
clone(0xffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit(0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

12:36:30 executing program 1:
r0 = socket$inet6(0xa, 0x3, 0x100000400000003a)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0xfffffffffffffdf6, &(0x7f0000000080)=[{&(0x7f0000000140)="82fa", 0x2e7}], 0x1}}], 0x1, 0x80)
sendmmsg(r0, &(0x7f0000000300), 0x22, 0x0)

12:36:30 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x100000400000003a)
r1 = socket$inet6(0xa, 0x3, 0x100000400000003a)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c)
sendmmsg(r1, &(0x7f0000000300)=[{{0x0, 0xfffffffffffffdf6, &(0x7f0000000080)=[{&(0x7f0000000140)="82fa", 0x2e7}], 0x1}}], 0x1, 0x80)
recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x40, 0x0)

12:36:30 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:30 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  856.870147] protocol 88fb is buggy, dev hsr_slave_0
[  856.875355] protocol 88fb is buggy, dev hsr_slave_1
12:36:30 executing program 1:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'bpq0\x00'}, 0x18)

[  857.190161] protocol 88fb is buggy, dev hsr_slave_0
[  857.195357] protocol 88fb is buggy, dev hsr_slave_1
[  857.345707] IPVS: stopping backup sync thread 22874 ...
[  857.350471] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0
[  857.369034] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0
[  857.440167] protocol 88fb is buggy, dev hsr_slave_0
[  857.445291] protocol 88fb is buggy, dev hsr_slave_1
12:36:33 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()
lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00))

12:36:33 executing program 0:
r0 = socket$inet6(0xa, 0x3, 0x100000400000003a)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x8)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c)
sendmmsg(r0, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)="bd07d5c91daac9f9", 0x8}, {&(0x7f0000000180)="d196188b1760cada6a64a58a1c7cf258", 0x10}], 0x2}}, {{&(0x7f0000000780)=@x25={0x9, @null='               \x00'}, 0x80, 0x0}}], 0x2, 0x0)

12:36:33 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:33 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:33 executing program 1:
r0 = memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0)
fallocate(r0, 0x0, 0x2000421, 0xd)
write(r0, &(0x7f0000002000)='/', 0x1)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0)
mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0)

12:36:33 executing program 2:

12:36:33 executing program 2:

12:36:33 executing program 0:

12:36:33 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:33 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  859.757846] kauditd_printk_skb: 87 callbacks suppressed
[  859.757855] audit: type=1400 audit(1569846993.692:14145): avc:  denied  { map } for  pid=22891 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=86285 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  859.835446] audit: type=1400 audit(1569846993.692:14144): avc:  denied  { map } for  pid=22884 comm="syz-executor.1" path=2F6D656D66643A2F6465762F6E65742F74756E202864656C6574656429 dev="tmpfs" ino=85428 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:36:33 executing program 1:

[  859.993382] audit: type=1400 audit(1569846993.842:14146): avc:  denied  { map } for  pid=22896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:34 executing program 0:

[  860.150129] audit: type=1400 audit(1569846993.852:14147): avc:  denied  { map } for  pid=22894 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  860.329436] audit: type=1400 audit(1569846993.862:14148): avc:  denied  { map } for  pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  860.433852] audit: type=1400 audit(1569846993.862:14149): avc:  denied  { map } for  pid=22894 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  860.547511] audit: type=1400 audit(1569846993.902:14150): avc:  denied  { map } for  pid=22896 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  860.605312] audit: type=1400 audit(1569846993.912:14151): avc:  denied  { map } for  pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  860.667363] audit: type=1400 audit(1569846993.912:14152): avc:  denied  { map } for  pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  860.702786] audit: type=1400 audit(1569846993.972:14153): avc:  denied  { map } for  pid=22896 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  861.590247] net_ratelimit: 22 callbacks suppressed
[  861.590253] protocol 88fb is buggy, dev hsr_slave_0
[  861.600574] protocol 88fb is buggy, dev hsr_slave_1
[  861.680133] protocol 88fb is buggy, dev hsr_slave_0
[  861.685263] protocol 88fb is buggy, dev hsr_slave_1
[  862.630201] protocol 88fb is buggy, dev hsr_slave_0
[  862.635568] protocol 88fb is buggy, dev hsr_slave_1
[  862.640723] protocol 88fb is buggy, dev hsr_slave_0
[  862.645874] protocol 88fb is buggy, dev hsr_slave_1
12:36:36 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)
getuid()

12:36:36 executing program 2:

12:36:36 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:36 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:36 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xc0, 0x0, 0x0, 0xee00}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, 0xe8)

12:36:36 executing program 0:
clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket(0x0, 0x0, 0x0)
poll(0x0, 0x0, 0x8000000000000200)
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$packet(0x11, 0x2, 0x300)
ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x11, 0x507, 0x0, 0x0, {0x0, r3}}, 0xd4}}, 0x0)

12:36:36 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:36 executing program 1:
clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket(0x0, 0x0, 0x0)
poll(0x0, 0x0, 0x8000000000000200)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x11, 0x507, 0x0, 0x0, {0x0, r6}}, 0xd4}}, 0x0)

12:36:36 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:36 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$setperm(0x5, r2, 0x1000000200200103)
keyctl$revoke(0x3, r2)

[  862.926041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'.
12:36:37 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:37 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  863.110171] protocol 88fb is buggy, dev hsr_slave_0
[  863.115465] protocol 88fb is buggy, dev hsr_slave_1
[  863.178603] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
[  863.276962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22938 comm=syz-executor.0
[  863.289913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'.
[  863.446088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22944 comm=syz-executor.1
[  863.458956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
12:36:39 executing program 0:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x440, 0x0)
ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040))
r2 = dup(r0)
bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r3 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0)
ftruncate(r3, 0x10099b7)
connect$unix(r2, &(0x7f0000000400)=@file={0x1, './bus\x00'}, 0x6e)

12:36:39 executing program 2:
r0 = memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0)
memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0)

12:36:39 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c8"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:39 executing program 1:
clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
poll(0x0, 0x0, 0x8000000000000200)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x11, 0x507, 0x0, 0x0, {0x0, r6}}, 0xd4}}, 0x0)

12:36:39 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fcntl$getown(r38, 0x9)

12:36:39 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:39 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:39 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:40 executing program 0:
pipe(&(0x7f00000001c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r4=>0xffffffffffffffff})
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4)
setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10)
connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14)
write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

[  866.044555] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
[  866.055344] kauditd_printk_skb: 118 callbacks suppressed
[  866.055353] audit: type=1800 audit(1569846999.992:14272): pid=22965 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="bus" dev="sda1" ino=16939 res=0
12:36:40 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  866.139275] audit: type=1400 audit(1569847000.022:14273): avc:  denied  { map } for  pid=22954 comm="syz-executor.2" path=2F6D656D66643A2F6465762F6E65742F74756E202864656C6574656429 dev="tmpfs" ino=86423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:36:40 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  866.281413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22977 comm=syz-executor.1
[  866.283456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
[  866.304908] audit: type=1400 audit(1569847000.202:14274): avc:  denied  { map } for  pid=22973 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:40 executing program 1:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip_vti0\x00')
r1 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@sco, &(0x7f0000000100)=0x80, 0x800)
setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10001, 0x6, 0x4, 0x40, 0xffff, 0x20, 0x10000}, 0x1c)
r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff)
setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "86d889b573dcf78a", "dbec04dfe7dc036eabe2b1bf05d6d5a167301ba185b56ecefe20990a2a0b7919", "a5149622", "b837d7f193eae27f"}, 0x38)
exit(0x80000000)
r3 = accept(r1, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80)
r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4001000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff81}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xee09}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x8001)
pipe2(&(0x7f0000000400)={0xffffffffffffffff, <r5=>0xffffffffffffffff}, 0x4800)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000440), 0x4)
r6 = socket$packet(0x11, 0x2, 0x300)
flistxattr(r6, &(0x7f0000000480)=""/250, 0xfa)
r7 = open(&(0x7f0000000580)='./file0\x00', 0x400000, 0x0)
setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f00000005c0)=0x93, 0x4)
write$P9_RRENAMEAT(r5, &(0x7f0000000600)={0x7, 0x4b, 0x1}, 0x7)
r8 = accept(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, <r9=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000006c0)=0x80)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r9, 0x6, 0x21, &(0x7f0000000700)="373418c6a3906a36a6146768ce5775a8", 0x10)
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000740)={<r10=>0x0}, &(0x7f0000000780)=0xc)
ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f00000007c0)=r10)
r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000800)='/dev/hwrng\x00', 0x0, 0x0)
accept4$inet(r11, &(0x7f0000000840)={0x2, 0x0, @dev}, &(0x7f0000000880)=0x10, 0x800)
r12 = creat(&(0x7f00000008c0)='./file0\x00', 0xfa)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, <r13=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000940)=0x14)
ioctl$sock_inet6_SIOCSIFADDR(r12, 0x8916, &(0x7f0000000980)={@empty, 0x7d, r13})
lgetxattr(&(0x7f00000009c0)='./file1\x00', &(0x7f0000000a00)=@random={'osx.', 'mime_typewlan0#$\x00'}, &(0x7f0000000a40)=""/132, 0x84)
socket$nl_generic(0x10, 0x3, 0x10)
r14 = accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14, 0x800)
getsockopt$SO_TIMESTAMPING(r14, 0x1, 0x25, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4)

12:36:40 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  866.409726] audit: type=1400 audit(1569847000.212:14275): avc:  denied  { map } for  pid=22973 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  866.555436] audit: type=1400 audit(1569847000.242:14276): avc:  denied  { map } for  pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  866.670391] audit: type=1400 audit(1569847000.272:14277): avc:  denied  { map } for  pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  866.756733] audit: type=1400 audit(1569847000.292:14278): avc:  denied  { map } for  pid=22979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  866.790131] net_ratelimit: 18 callbacks suppressed
[  866.790137] protocol 88fb is buggy, dev hsr_slave_0
12:36:40 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0)
fallocate(r0, 0x0, 0x0, 0x9)

12:36:40 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:40 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  866.795805] audit: type=1400 audit(1569847000.292:14279): avc:  denied  { map } for  pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  866.800246] protocol 88fb is buggy, dev hsr_slave_1
[  866.830295] protocol 88fb is buggy, dev hsr_slave_0
[  866.835414] protocol 88fb is buggy, dev hsr_slave_1
[  866.934459] audit: type=1400 audit(1569847000.292:14280): avc:  denied  { map } for  pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  867.066311] audit: type=1400 audit(1569847000.302:14281): avc:  denied  { map } for  pid=22979 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  867.270144] protocol 88fb is buggy, dev hsr_slave_0
[  867.275710] protocol 88fb is buggy, dev hsr_slave_1
[  867.590158] protocol 88fb is buggy, dev hsr_slave_0
[  867.595555] protocol 88fb is buggy, dev hsr_slave_1
[  867.830212] protocol 88fb is buggy, dev hsr_slave_0
[  867.835556] protocol 88fb is buggy, dev hsr_slave_1
12:36:42 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440)={<r38=>0xffffffffffffffff})
vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

12:36:42 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:42 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:42 executing program 0:
gettid()
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
socket(0x0, 0x0, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0)
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0)
getpgrp(0x0)
r3 = gettid()
r4 = inotify_init1(0x0)
fcntl$setown(r4, 0x8, 0xffffffffffffffff)
fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, <r5=>0x0})
kcmp(r5, r3, 0x3, 0xffffffffffffffff, 0xffffffffffffffff)
ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0)
memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)

12:36:42 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10)
connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10)

12:36:42 executing program 1:

12:36:43 executing program 1:

12:36:43 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:43 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:43 executing program 2:

12:36:43 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:43 executing program 1:

[  871.990187] net_ratelimit: 22 callbacks suppressed
[  871.990193] protocol 88fb is buggy, dev hsr_slave_0
[  872.000280] protocol 88fb is buggy, dev hsr_slave_1
12:36:46 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440))

12:36:46 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:46 executing program 0:

12:36:46 executing program 2:

12:36:46 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r1 = socket(0x400000000000010, 0x802, 0x0)
write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000000000ba0080080002007f196be0", 0x24)

12:36:46 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  872.080192] protocol 88fb is buggy, dev hsr_slave_0
[  872.085314] protocol 88fb is buggy, dev hsr_slave_1
12:36:46 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth0_to_bridge\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='&']})

12:36:46 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_proto_private(r0, 0x89ef, &(0x7f0000000380)="5dccffce36d3cb9d59f828626e044e2d43e75ea5d977b3e2ff1b89a9c62d293df0560e08d4090cf93d7a9868bed5dbb32920d777202bb9435530552e281d547db118b4f45e70199f905d0831f101a23b417bb01c5d5ac1db935ba1ebb69898dfd83d4bb782afde748da8300bc66d3854947bb9ebbcabea1e9988843139ac9360a93c")
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)=""/189, &(0x7f0000000140)=0xbd)
r1 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@caif=@rfm, &(0x7f0000000300)=0x80, 0x3fbf338f3ade361b)
r2 = socket(0x80000000000000a, 0x0, 0x0)
connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1a)
setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x12, &(0x7f0000005ec0), 0x58)
r3 = accept$inet6(r2, 0x0, &(0x7f00000004c0))
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000480), 0x1fffffffffffff73)
r4 = accept4$unix(r1, &(0x7f0000000440), &(0x7f0000000340)=0x6e, 0x80000)
r5 = gettid()
pipe(&(0x7f0000001140)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r5, r6, 0x0, 0x0, 0x0}, 0x30)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, 0x0, &(0x7f0000000600))
r8 = socket(0x400000010, 0x802, 0x0)
write(r8, &(0x7f0000000380)="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", 0x166)
getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000002700)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000e00)=0xffffffffffffff1c)
r9 = getgid()
r10 = getgid()
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000018c0)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="000000000000000000000000ff00000000000000000000000000000000000000000000000000000000e5ffffffffffffff000000000000000000000000000000000000000000000000d5ffce76f8"], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000700000001040000020000003c37000008000000008000000000000000000000060000000400000000000000628d000006000000ff070000090000000d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00050010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038006f776e657200"/462, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB], 0x8)
setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000640)={r5}, 0xc)
r11 = socket$inet6_tcp(0xa, 0x1, 0x0)
accept4(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x0, 0x0)
sendto$inet6(r11, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c)

12:36:46 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:46 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:46 executing program 1:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'nr0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")

[  872.273984] kauditd_printk_skb: 108 callbacks suppressed
[  872.273993] audit: type=1400 audit(1569847006.212:14390): avc:  denied  { map } for  pid=23046 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=86546 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
[  872.447426] audit: type=1400 audit(1569847006.262:14391): avc:  denied  { map } for  pid=23049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:46 executing program 0:
r0 = socket$inet(0x10, 0x2, 0x0)
sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0)

[  872.634999] audit: type=1400 audit(1569847006.302:14392): avc:  denied  { map } for  pid=23049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  872.674448] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  872.773656] audit: type=1400 audit(1569847006.312:14393): avc:  denied  { map } for  pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  872.911252] audit: type=1400 audit(1569847006.312:14394): avc:  denied  { map } for  pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  873.030175] protocol 88fb is buggy, dev hsr_slave_0
[  873.035319] protocol 88fb is buggy, dev hsr_slave_1
[  873.040489] protocol 88fb is buggy, dev hsr_slave_0
[  873.045586] protocol 88fb is buggy, dev hsr_slave_1
[  873.063144] audit: type=1400 audit(1569847006.332:14395): avc:  denied  { map } for  pid=23049 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  873.165920] audit: type=1400 audit(1569847006.352:14396): avc:  denied  { map } for  pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  873.232775] audit: type=1400 audit(1569847006.362:14397): avc:  denied  { map } for  pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  873.260011] audit: type=1400 audit(1569847006.392:14398): avc:  denied  { map } for  pid=23051 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  873.269482] audit: audit_backlog=65 > audit_backlog_limit=64
[  873.510140] protocol 88fb is buggy, dev hsr_slave_0
[  873.515333] protocol 88fb is buggy, dev hsr_slave_1
12:36:49 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:49 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:49 executing program 0:
r0 = socket$inet(0x10, 0x2, 0x0)
sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0)

12:36:49 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f00000028c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_retopts={{0x20, 0x0, 0x7, {[@rr={0x7, 0xf, 0x9, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1]}]}}}], 0x20}}], 0x1, 0x0)

12:36:49 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
pipe(&(0x7f0000000440))

12:36:49 executing program 1:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)=0xfff)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000800)=@raw={'raw\x00', 0x9, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0xf0, 0xf0, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [0xffffffff], 'veth1_to_hsr\x00', 'veth1\x00', {}, {0x1fe}}, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'rose0\x00', 'team_slave_1\x00'}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0)

12:36:49 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:49 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x3, 0x4182)
r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0)
pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r1, 0x0, 0x24000000)

12:36:49 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, <r3=>0x0})
ptrace$setopts(0x4206, r3, 0x0, 0x0)
ptrace(0x4207, r3)
ptrace$setregset(0x1b, r3, 0x20000004, 0x0)

12:36:49 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:49 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  875.663893] ptrace attach of "/root/syz-executor.0"[6984] was attempted by "/root/syz-executor.0"[23107]
12:36:49 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:49 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  875.836681] EXT4-fs (loop1): inodes count not valid: 4142989440 vs 128
[  875.858422] ptrace attach of "/root/syz-executor.0"[6984] was attempted by "/root/syz-executor.0"[23113]
12:36:49 executing program 0:
r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x14)
getsockname(r0, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
ioctl$SCSI_IOCTL_SYNC(r2, 0x4)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f})
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d51e56e3d430303030303030303030303030303030303030302c6f626a5f747970653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d6e657430"])
write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200)
sendfile(r2, r3, 0x0, 0x7fffffa7)
r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec)
sendfile(r4, r2, 0x0, 0xffffffff)
ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a1dd6e15e4ba5")
r5 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0)
r6 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0)
mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, r6, 0x0)
r7 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0)
getsockname(r6, &(0x7f00000004c0)=@ethernet={0x0, @random}, &(0x7f0000000400)=0x80)
ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000001900))
openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0x0, 0x0)
getsockname$inet6(r5, &(0x7f0000000580)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000800)=0x1c)

12:36:50 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getgroups(0x0, 0x0)
ioctl$KVM_SET_FPU(r2, 0x4010aefd, &(0x7f0000000200))

12:36:50 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_TSC_KHZ(r2, 0x4018aefa, 0x0)

[  877.146460] 
[  877.148128] ======================================================
[  877.154540] WARNING: possible circular locking dependency detected
[  877.160866] 4.14.146 #0 Not tainted
[  877.164489] ------------------------------------------------------
[  877.170806] syz-executor.0/23126 is trying to acquire lock:
[  877.177251]  (&rp->fetch_lock){+.+.}, at: [<ffffffff83f7dc5f>] mon_bin_vma_fault+0x6f/0x280
[  877.187251] 
[  877.187251] but task is already holding lock:
[  877.193405]  (&mm->mmap_sem){++++}, at: [<ffffffff817bd755>] __mm_populate+0x1e5/0x2c0
[  877.204313] 
[  877.204313] which lock already depends on the new lock.
[  877.204313] 
[  877.213064] 
[  877.213064] the existing dependency chain (in reverse order) is:
[  877.220773] 
[  877.220773] -> #1 (&mm->mmap_sem){++++}:
[  877.226331]        lock_acquire+0x16f/0x430
[  877.230669]        __might_fault+0x143/0x1d0
[  877.235082]        mon_bin_fetch+0x212/0x2e0
[  877.239511]        mon_bin_ioctl+0x1c5/0xb50
[  877.243926]        do_vfs_ioctl+0x7ae/0x1060
[  877.248684]        SyS_ioctl+0x8f/0xc0
[  877.252578]        do_syscall_64+0x1e8/0x640
[  877.256999]        entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  877.262706] 
[  877.262706] -> #0 (&rp->fetch_lock){+.+.}:
[  877.263201] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  877.268460]        __lock_acquire+0x2cb3/0x4620
[  877.268467]        lock_acquire+0x16f/0x430
[  877.268474]        __mutex_lock+0xe8/0x1470
[  877.268480]        mutex_lock_nested+0x16/0x20
[  877.268487]        mon_bin_vma_fault+0x6f/0x280
[  877.268500]        __do_fault+0x104/0x390
[  877.296509] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  877.298131]        __handle_mm_fault+0xde1/0x3470
[  877.298139]        handle_mm_fault+0x293/0x7c0
[  877.298146]        __get_user_pages+0x465/0x1220
[  877.298157]        populate_vma_page_range+0x18e/0x230
[  877.314930] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  877.316253]        __mm_populate+0x198/0x2c0
[  877.323129] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  877.325840]        vm_mmap_pgoff+0x1be/0x1d0
[  877.325848]        SyS_mmap_pgoff+0x3ca/0x520
[  877.325855]        SyS_mmap+0x16/0x20
[  877.325867]        do_syscall_64+0x1e8/0x640
[  877.349256] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  877.350979]        entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  877.350982] 
[  877.350982] other info that might help us debug this:
[  877.350982] 
[  877.350984]  Possible unsafe locking scenario:
[  877.350984] 
[  877.350985]        CPU0                    CPU1
[  877.350987]        ----                    ----
[  877.350988]   lock(&mm->mmap_sem);
[  877.350994]                                lock(&rp->fetch_lock);
[  877.351004]                                lock(
[  877.357683] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  877.360420] &mm->mmap_sem);
[  877.360424]   lock(&rp->fetch_lock);
[  877.360431] 
[  877.360431]  *** DEADLOCK ***
[  877.360431] 
[  877.360437] 1 lock held by syz-executor.0/23126:
[  877.360438]  #0:  (&mm->mmap_sem){++++}, at: [<ffffffff817bd755>] __mm_populate+0x1e5/0x2c0
[  877.360459] 
[  877.360459] stack backtrace:
[  877.360472] CPU: 1 PID: 23126 Comm: syz-executor.0 Not tainted 4.14.146 #0
[  877.385164] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  877.391701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  877.391705] Call Trace:
[  877.391719]  dump_stack+0x138/0x197
[  877.391728]  ? vprintk_func+0x65/0x159
[  877.391738]  print_circular_bug.isra.0.cold+0x1cc/0x28f
[  877.391750]  __lock_acquire+0x2cb3/0x4620
[  877.398170] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  877.402903]  ? trace_hardirqs_on_caller+0x400/0x590
[  877.402915]  ? trace_hardirqs_on+0x10/0x10
[  877.402923]  ? perf_trace_lock_acquire+0x10d/0x4f0
[  877.402933]  ? kmem_cache_alloc+0x12e/0x780
[  877.402948]  lock_acquire+0x16f/0x430
[  877.428121] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  877.431385]  ? mon_bin_vma_fault+0x6f/0x280
[  877.431394]  ? mon_bin_vma_fault+0x6f/0x280
[  877.431403]  __mutex_lock+0xe8/0x1470
[  877.431408]  ? mon_bin_vma_fault+0x6f/0x280
[  877.431421]  ? save_trace+0x290/0x290
[  877.452388] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  877.459183]  ? mon_bin_vma_fault+0x6f/0x280
[  877.459199]  ? mutex_trylock+0x1c0/0x1c0
[  877.487796] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
[  877.489529]  ? ptlock_alloc+0x20/0x70
[  877.503558] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  877.506712]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  877.523444] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  877.525187]  ? rcu_read_lock_sched_held+0x110/0x130
[  877.525200]  ? kmem_cache_alloc+0x611/0x780
[  877.542194] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  877.548021]  ? __lockdep_init_map+0x10c/0x570
[  877.548034]  mutex_lock_nested+0x16/0x20
[  877.646337]  ? mutex_lock_nested+0x16/0x20
[  877.650582]  mon_bin_vma_fault+0x6f/0x280
[  877.654997]  __do_fault+0x104/0x390
[  877.658610]  __handle_mm_fault+0xde1/0x3470
[  877.662922]  ? vm_insert_mixed_mkwrite+0x40/0x40
[  877.667863]  ? find_held_lock+0x35/0x130
[  877.671904]  ? handle_mm_fault+0x1b6/0x7c0
[  877.676126]  handle_mm_fault+0x293/0x7c0
[  877.680170]  __get_user_pages+0x465/0x1220
[  877.684387]  ? follow_page_mask+0x1560/0x1560
[  877.689121]  ? memset+0x32/0x40
[  877.692390]  populate_vma_page_range+0x18e/0x230
[  877.698437]  __mm_populate+0x198/0x2c0
[  877.702306]  ? populate_vma_page_range+0x230/0x230
[  877.707219]  vm_mmap_pgoff+0x1be/0x1d0
[  877.711090]  ? vma_is_stack_for_current+0xa0/0xa0
[  877.715917]  ? __fget+0x237/0x370
[  877.719351]  SyS_mmap_pgoff+0x3ca/0x520
[  877.723567]  ? find_mergeable_anon_vma+0x2c0/0x2c0
[  877.728574]  ? do_syscall_64+0x53/0x640
[  877.732569]  ? align_vdso_addr+0x60/0x60
[  877.736626]  SyS_mmap+0x16/0x20
[  877.739998]  do_syscall_64+0x1e8/0x640
[  877.744360]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  877.749197]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  877.754540] RIP: 0033:0x459a29
[  877.757718] RSP: 002b:00007f571a8bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[  877.766629] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a29
[  877.774507] RDX: 0000000001000002 RSI: 0000000000400300 RDI: 0000000020a05000
[  877.782208] RBP: 000000000075bfc8 R08: 0000000000000009 R09: 0000000000000000
[  877.789828] R10: 0000000000008012 R11: 0000000000000246 R12: 00007f571a8bc6d4
[  877.797077] R13: 00000000004c5f27 R14: 00000000004dabb8 R15: 00000000ffffffff
[  877.804508] net_ratelimit: 18 callbacks suppressed
[  877.804511] protocol 88fb is buggy, dev hsr_slave_0
[  877.810214] protocol 88fb is buggy, dev hsr_slave_0
[  877.814629] protocol 88fb is buggy, dev hsr_slave_1
[  877.819695] protocol 88fb is buggy, dev hsr_slave_1
[  877.824745] protocol 88fb is buggy, dev hsr_slave_0
[  877.834793] protocol 88fb is buggy, dev hsr_slave_1
[  877.851474] kauditd_printk_skb: 161 callbacks suppressed
[  877.851481] audit: type=1400 audit(1569847011.792:14549): avc:  denied  { map } for  pid=23123 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  877.970893] audit: type=1400 audit(1569847011.802:14550): avc:  denied  { map } for  pid=23130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  877.993286] protocol 88fb is buggy, dev hsr_slave_0
[  877.993349] protocol 88fb is buggy, dev hsr_slave_1
[  878.019000] audit: type=1400 audit(1569847011.802:14551): avc:  denied  { map } for  pid=23130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  878.044335] audit: type=1400 audit(1569847011.812:14552): avc:  denied  { map } for  pid=23130 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  878.083482] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  878.098807] audit: type=1400 audit(1569847011.822:14553): avc:  denied  { map } for  pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  878.109070] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  878.129991] audit: type=1400 audit(1569847011.822:14554): avc:  denied  { map } for  pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  878.154656] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env
[  878.161092] audit: type=1400 audit(1569847011.822:14555): avc:  denied  { map } for  pid=23134 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  878.188216] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  878.191090] audit: type=1400 audit(1569847011.832:14556): avc:  denied  { map } for  pid=23134 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  878.225390] audit: type=1400 audit(1569847011.832:14557): avc:  denied  { map } for  pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  878.249566] protocol 88fb is buggy, dev hsr_slave_0
[  878.249603] protocol 88fb is buggy, dev hsr_slave_1
12:36:52 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r34=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r35=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r36=>0x0})
getresgid(&(0x7f0000000c00)=<r37=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)

12:36:52 executing program 1:

12:36:52 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:52 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:52 executing program 2:

[  878.264921] audit: type=1400 audit(1569847011.832:14558): avc:  denied  { map } for  pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
12:36:52 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:52 executing program 0:

[  878.309347] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env
[  878.333620] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0'
12:36:52 executing program 2:

12:36:52 executing program 1:

12:36:52 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:52 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  878.444629] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
12:36:52 executing program 0:

[  878.485792] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  878.529622] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  878.570338] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  878.630882] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env
[  878.637369] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  878.650503] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env
[  878.656977] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0'
12:36:55 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0)

12:36:55 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:55 executing program 2:

12:36:55 executing program 0:

12:36:55 executing program 1:

12:36:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:55 executing program 0:

12:36:55 executing program 1:

12:36:55 executing program 2:

12:36:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  881.419208] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env
12:36:55 executing program 1:
syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nobarrier='nobarrier'}]})

12:36:55 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  881.464939] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0'
[  881.485189] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
[  881.519964] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  881.559714] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  881.567147] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  881.581159] hfsplus: unable to find HFS+ superblock
[  881.595629] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  881.604827] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  881.620116] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  881.627799] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  881.628730] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env
[  881.647780] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  881.657780] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  881.659627] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
[  881.666552] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  881.671372] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  881.689274] hfsplus: unable to find HFS+ superblock
[  881.699231] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env
[  881.706087] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  881.741328] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  881.747888] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  881.810556] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  881.825576] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  883.990118] net_ratelimit: 26 callbacks suppressed
[  883.990123] protocol 88fb is buggy, dev hsr_slave_0
[  883.990126] protocol 88fb is buggy, dev hsr_slave_0
[  883.990180] protocol 88fb is buggy, dev hsr_slave_1
[  883.995145] protocol 88fb is buggy, dev hsr_slave_1
[  884.070171] protocol 88fb is buggy, dev hsr_slave_0
[  884.075279] protocol 88fb is buggy, dev hsr_slave_1
[  884.230119] protocol 88fb is buggy, dev hsr_slave_0
[  884.235201] protocol 88fb is buggy, dev hsr_slave_1
12:36:58 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000427, 0x40)
write(r0, &(0x7f0000002000)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x41395527)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600))
inotify_init1(0x81800)
syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600))
r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400))
r7 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getresgid(&(0x7f0000000c00)=<r11=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r12 = gettid()
tkill(r12, 0x1000000000016)
r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}})
getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8)
fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3)
r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400))
r17 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0})
getresgid(&(0x7f0000000c00)=<r21=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600))
r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600))
r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600))
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
write(r25, &(0x7f0000000340), 0x41395527)
getpid()
r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400))
r27 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0})
getresgid(&(0x7f0000000c00)=<r31=>0x0, &(0x7f0000000c40), 0x0)
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc)
stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00))
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0)
getpid()
getuid()
r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0)
ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400))
r33 = dup(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000b00))

12:36:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:58 executing program 2:
syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@session={'session'}}]})

12:36:58 executing program 0:
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ftruncate(r0, 0x8003f1)
r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0))
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x0, 0x7})

12:36:58 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:58 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
r0 = socket$inet(0x2, 0x0, 0x0)
r1 = socket(0x10, 0x2, 0x0)
write(r1, &(0x7f0000000140)="1c0000001a009b8a14e5f4070009042401000000ff00000000000000", 0x1c)
recvmmsg(r1, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,')
sendfile(r0, r2, 0x0, 0x80000003)
socket(0x0, 0x2, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0)
ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040))

12:36:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  884.434723] kauditd_printk_skb: 100 callbacks suppressed
[  884.434732] audit: type=1804 audit(1569847018.372:14659): pid=23202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir902650667/syzkaller.LiQj26/628/bus" dev="sda1" ino=17042 res=1
[  884.470256] protocol 88fb is buggy, dev hsr_slave_0
[  884.475535] protocol 88fb is buggy, dev hsr_slave_1
12:36:58 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

12:36:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  884.475998] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
[  884.492010] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  884.498881] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env
[  884.504104] hfsplus: invalid session number or type of track
[  884.515728] hfsplus: unable to find HFS+ superblock
[  884.516413] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  884.580332] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
[  884.587617] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  884.592261] audit: type=1400 audit(1569847018.382:14660): avc:  denied  { map } for  pid=23200 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=85928 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
12:36:58 executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  884.689635] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
[  884.712098] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env
[  884.718575] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4'
12:36:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17efebdbebf1f90a96d9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28)

[  884.722162] audit: type=1400 audit(1569847018.462:14661): avc:  denied  { map } for  pid=23211 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  884.730552] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
12:36:58 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
r0 = socket$inet(0x2, 0x0, 0x0)
r1 = socket(0x10, 0x2, 0x0)
write(r1, &(0x7f0000000140)="1c0000001a009b8a14e5f4070009042401000000ff00000000000000", 0x1c)
recvmmsg(r1, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,')
sendfile(r0, r2, 0x0, 0x80000003)
socket(0x0, 0x2, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0)
ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040))

[  884.833739] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  884.856346] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  884.863061] audit: type=1400 audit(1569847018.542:14663): avc:  denied  { map } for  pid=23214 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  884.958602] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env
[  884.960203] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env
[  884.979234] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  884.996416] audit: type=1400 audit(1569847018.502:14662): avc:  denied  { map } for  pid=23213 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  885.012992] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0'
[  885.046957] audit: type=1400 audit(1569847018.542:14664): avc:  denied  { map } for  pid=23213 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  885.073102] audit: type=1400 audit(1569847018.552:14665): avc:  denied  { map } for  pid=23214 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  885.083643] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env
[  885.114209] audit: type=1400 audit(1569847018.582:14666): avc:  denied  { map } for  pid=23218 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  885.133365] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  885.153685] audit: type=1400 audit(1569847018.592:14667): avc:  denied  { map } for  pid=23218 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  885.166027] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env
[  885.192783] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  885.217289] audit: type=1400 audit(1569847018.592:14668): avc:  denied  { map } for  pid=23218 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1