32825] audit: type=1400 audit(1569846823.642:10919): avc: denied { map } for pid=20686 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 690.460196] audit: type=1400 audit(1569846823.642:10920): avc: denied { map } for pid=20686 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 690.589313] audit: type=1400 audit(1569846823.642:10921): avc: denied { map } for pid=20686 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:46 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400)) r71 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r71, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r70, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) 12:33:46 executing program 5: ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0) 12:33:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="b8112eb734cc407da0591d31e503e190", 0x10) 12:33:46 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) acct(&(0x7f0000000000)='./file0\x00') 12:33:46 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d56", 0x69, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:46 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8581, 0xbb2fdd7cd9b9a34d) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) 12:33:46 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d56", 0x69, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:46 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) fcntl$getflags(r0, 0x1) 12:33:46 executing program 5: 12:33:46 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4800, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000000c0)="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") 12:33:46 executing program 2: [ 692.861891] Process accounting resumed 12:33:47 executing program 5: 12:33:49 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400)) r71 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r71, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) 12:33:49 executing program 5: 12:33:49 executing program 1: 12:33:49 executing program 2: 12:33:49 executing program 4: syz_emit_ethernet(0x7b, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x11, 0x4, 0x1, 0x2c, 0x6d, 0x65, 0x0, 0x9, 0x27, 0x0, @multicast1, @multicast2, {[@cipso={0x86, 0x2d, 0xffffffff, [{0x0, 0xb, "4ded7e4ed7215355fe"}, {0x5, 0xa, "98ab47393f5821b8"}, {0x0, 0xd, "22f1e2b9e6067e8083643e"}, {0x0, 0x5, "bc496b"}]}]}}, @igmp={0x12, 0x3f, 0x0, @multicast1, "af102f7affa6d4f48c3194649fb3746447de406ac706d52602ffe754d24cb90ccc"}}}}}, 0x0) 12:33:49 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d56", 0x69, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:49 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95}) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000000c0)) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/5) lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)) socketpair(0x1e, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, 0xffffffffffffffff}) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 12:33:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@fat=@nfs='nfs'}]}) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) 12:33:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ffffffff000000006000000000000000e000000200000000000000000000000000000000000000000a003f8000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/112], 0xb8}}, 0x0) 12:33:49 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000000c0)) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x0) close(r0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20104}, 0x20) dup2(r0, 0xffffffffffffffff) lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)) socketpair(0x1e, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, 0xffffffffffffffff}) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 12:33:49 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f6", 0x6c, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) [ 695.936994] kauditd_printk_skb: 87 callbacks suppressed [ 695.937003] audit: type=1400 audit(1569846829.872:11009): avc: denied { map } for pid=20763 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=78866 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 696.051327] audit: type=1400 audit(1569846829.902:11010): avc: denied { map } for pid=20766 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 696.244517] audit: type=1400 audit(1569846829.912:11011): avc: denied { map } for pid=20766 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 696.452552] audit: type=1400 audit(1569846829.962:11012): avc: denied { map } for pid=20766 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 696.489331] overlayfs: failed to resolve 'file0ÿÿÿ': -2 [ 696.604580] FAT-fs (loop2): bogus number of reserved sectors [ 696.642982] overlayfs: failed to resolve 'file0ÿÿÿ': -2 [ 696.653791] audit: type=1400 audit(1569846830.002:11013): avc: denied { map } for pid=20766 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 696.670252] FAT-fs (loop2): Can't find a valid FAT filesystem [ 696.830238] audit: type=1400 audit(1569846830.022:11014): avc: denied { map } for pid=20766 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 696.857347] FAT-fs (loop2): bogus number of reserved sectors [ 696.940074] FAT-fs (loop2): Can't find a valid FAT filesystem [ 696.951061] audit: type=1400 audit(1569846830.032:11015): avc: denied { map } for pid=20764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 697.038161] audit: type=1400 audit(1569846830.032:11016): avc: denied { map } for pid=20764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 697.060905] audit: type=1400 audit(1569846830.042:11017): avc: denied { map } for pid=20764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 697.097493] audit: type=1400 audit(1569846830.062:11018): avc: denied { map } for pid=20764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:52 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) 12:33:52 executing program 4: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) fallocate(r1, 0x4000000000000010, 0x0, 0x7fff) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) 12:33:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 12:33:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) faccessat(0xffffffffffffffff, 0x0, 0x10, 0x0) 12:33:52 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f6", 0x6c, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:52 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x14) getsockname(r0, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) 12:33:52 executing program 5: r0 = socket(0xa, 0x801, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@mcast2, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r2}) 12:33:52 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f6", 0x6c, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:33:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@cred={{0x1c}}], 0x20}, 0x0) 12:33:53 executing program 1: 12:33:53 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e9", 0x6e, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:55 executing program 1: 12:33:55 executing program 5: 12:33:55 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e9", 0x6e, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:55 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x14) getsockname(r0, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) 12:33:55 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r70 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r70, 0x800454e1, &(0x7f0000000400)) 12:33:55 executing program 4: 12:33:55 executing program 5: 12:33:55 executing program 4: 12:33:55 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 12:33:55 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e9", 0x6e, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) [ 702.060925] kauditd_printk_skb: 161 callbacks suppressed [ 702.060933] audit: type=1400 audit(1569846836.002:11180): avc: denied { map } for pid=20853 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:56 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) [ 702.309464] audit: type=1400 audit(1569846836.002:11181): avc: denied { map } for pid=20853 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 12:33:56 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x81, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8) setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000040)=0x6, 0x4) r3 = accept4(r1, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000340)={0xfff, {{0x2, 0x4e24, @rand_addr=0x401}}}, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x881, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 702.517083] audit: type=1400 audit(1569846836.002:11182): avc: denied { map } for pid=20853 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 702.589907] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20868] [ 702.689632] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20868] [ 702.811063] audit: type=1400 audit(1569846836.002:11183): avc: denied { map } for pid=20853 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:56 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:33:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) fremovexattr(r3, 0x0) [ 702.971467] audit: type=1800 audit(1569846836.032:11184): pid=20854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16737 res=0 [ 703.119992] audit: type=1400 audit(1569846836.042:11185): avc: denied { map } for pid=20853 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.208050] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20882] [ 703.294286] audit: type=1804 audit(1569846836.042:11186): pid=20854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir566391355/syzkaller.BCGOhD/8/file0/file0" dev="sda1" ino=16737 res=1 [ 703.425967] audit: audit_backlog=65 > audit_backlog_limit=64 [ 703.433391] audit: type=1400 audit(1569846836.062:11187): avc: denied { map } for pid=20853 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.464516] audit: audit_lost=1022 audit_rate_limit=0 audit_backlog_limit=64 12:33:58 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) 12:33:58 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:58 executing program 2: syz_emit_ethernet(0x92, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '_V\f', 0x5c, 0x0, 0x0, @dev, @local, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@ipv4={[], [], @broadcast}]}], @gre}}}}}, 0x0) 12:33:58 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:33:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x81, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8) setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000040)=0x6, 0x4) r3 = accept4(r1, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000340)={0xfff, {{0x2, 0x4e24, @rand_addr=0x401}}}, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x881, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 12:33:58 executing program 4: 12:33:59 executing program 4: [ 705.053873] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20898] 12:33:59 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r5, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:33:59 executing program 2: 12:33:59 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(0x0, &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', r0) 12:33:59 executing program 4: [ 705.417641] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20911] 12:33:59 executing program 2: 12:34:02 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', 0x0, &(0x7f0000000480)='vfat\x00', r0) 12:34:02 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000140)) 12:34:02 executing program 4: 12:34:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file1\x00', 0x0) utimes(&(0x7f0000000100)='./file1\x00', 0x0) 12:34:02 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r66}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r67}, {}], {}, [{0x8, 0x7, r68}, {}, {0x8, 0x4, r69}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) 12:34:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 12:34:02 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x0) socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10) r3 = dup2(r2, r2) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1") madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18) r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6}) [ 708.146036] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20926] 12:34:02 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', 0x0, &(0x7f0000000480)='vfat\x00', r0) 12:34:02 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) 12:34:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) 12:34:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 708.306119] kauditd_printk_skb: 117 callbacks suppressed [ 708.306128] audit: type=1400 audit(1569846842.242:11304): avc: denied { map } for pid=20930 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79103 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 708.474488] audit: type=1400 audit(1569846842.302:11305): avc: denied { map } for pid=20934 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:34:02 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', 0x0, &(0x7f0000000480)='vfat\x00', r0) [ 708.523776] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20943] 12:34:02 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) inotify_init1(0x0) [ 708.662440] audit: type=1400 audit(1569846842.302:11306): avc: denied { map } for pid=20934 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.779743] audit: type=1400 audit(1569846842.312:11307): avc: denied { map } for pid=20934 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.882495] audit: type=1400 audit(1569846842.312:11308): avc: denied { map } for pid=20934 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:02 executing program 2: 12:34:02 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaa0000000000000000000000000000000000009d52000002000002fb020000000000018820907800c2040060b680fa0000000000000000000000000000ffffffffffac30000000000000000000ffffac14ffbb0000000000000000000066d878317bd3eb00c78626812b4491d69cc93a91535ed54c1c8e151b6b2fa749d51bcdf10d6d53ee63979a3feb144afa3ba796d1a28d2a9047fc49e7f3cad2b26bb121d6125b59ad393c6dccbf0770c330f785fec51e768e3a8005da95d2080a7aba3760350bc00d5b00d56bb0159b1070b92dbf2062bc3a960b4e7aa2d2ab7ab49b385c3715b142113b84b3b97563c2450ee9386a97097718c7748425f03fd40107541272dd63d324470ce3a75ac1714ed590f3db6565124fa38bec41bf3ea2c1871519e4d141f67f80fec7e7040fff7f00000000000058c338b147aa0d4c1272c4328298c2d73aa8a1048667300d776a7d51811627756e00ee8f2f4ebfedf7be"], 0x0) socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10) r3 = dup2(r2, r2) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1") madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18) r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6}) [ 709.047366] audit: type=1400 audit(1569846842.332:11309): avc: denied { map } for pid=20934 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.084489] audit: type=1400 audit(1569846842.332:11310): avc: denied { map } for pid=20934 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.224784] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20958] [ 709.247370] audit: type=1400 audit(1569846842.412:11311): avc: denied { map } for pid=20938 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.366604] audit: type=1400 audit(1569846842.412:11312): avc: denied { map } for pid=20938 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.494612] audit: type=1400 audit(1569846842.442:11313): avc: denied { map } for pid=20938 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:05 executing program 1: 12:34:05 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, r0) 12:34:05 executing program 2: 12:34:05 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:05 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaa0000000000000000000000000000000000009d52000002000002fb020000000000018820907800c2040060b680fa0000000000000000000000000000ffffffffffac30000000000000000000ffffac14ffbb0000000000000000000066d878317bd3eb00c78626812b4491d69cc93a91535ed54c1c8e151b6b2fa749d51bcdf10d6d53ee63979a3feb144afa3ba796d1a28d2a9047fc49e7f3cad2b26bb121d6125b59ad393c6dccbf0770c330f785fec51e768e3a8005da95d2080a7aba3760350bc00d5b00d56bb0159b1070b92dbf2062bc3a960b4e7aa2d2ab7ab49b385c3715b142113b84b3b97563c2450ee9386a97097718c7748425f03fd40107541272dd63d324470ce3a75ac1714ed590f3db6565124fa38bec41bf3ea2c1871519e4d141f67f80fec7e7040fff7f00000000000058c338b147aa0d4c1272c4328298c2d73aa8a1048667300d776a7d51811627756e00ee8f2f4ebfedf7be"], 0x0) socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10) r3 = dup2(r2, r2) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1") madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18) r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6}) 12:34:05 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0) 12:34:05 executing program 1: 12:34:05 executing program 2: [ 711.271721] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20973] 12:34:05 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, r0) 12:34:05 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) 12:34:05 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300500, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x0) socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10) r3 = dup2(r2, r2) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000002c0)="0856220e04017c80c3bc355cd2b814ed318e4ca1274a3d5842a83fdfd85641269962409ab5514e68c63ca5fa68f74cee958d0afad26ff58008619ee8fdc70166da8d634b22f580d4bb9d6c3d27472018ebd33641f7397157eca140be6ca8f4327c2876468da553fdddd0a615bfa5a9f6a7e41066d4b1290226225c17e62090b21bb9bf004ac2c8ab27c0293a913e3cf1") madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18) r6 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000380)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fcntl$lock(r7, 0x25, &(0x7f0000000040)={0x6}) 12:34:05 executing program 1: 12:34:05 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) [ 711.829660] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20989] 12:34:05 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, r0) 12:34:05 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r0 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 12:34:05 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) 12:34:05 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) [ 712.091133] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[20996] 12:34:08 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0) 12:34:08 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) inotify_init1(0x0) 12:34:08 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{}, {r1}], 0x2, 0x0) 12:34:08 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$eventfd(r0, 0x0, 0xfffffceb) 12:34:08 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:08 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 12:34:08 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:08 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0) [ 714.398373] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[21016] [ 714.410734] kauditd_printk_skb: 134 callbacks suppressed [ 714.410742] audit: type=1400 audit(1569846848.342:11448): avc: denied { block_suspend } for pid=21013 comm="syz-executor.2" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 12:34:08 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{}, {}, {}, {r1, 0x40}], 0x4, 0x0) 12:34:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000480)=""/246) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGREP(r0, 0x4004743c, 0x0) 12:34:08 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) [ 714.594161] audit: type=1400 audit(1569846848.442:11449): avc: denied { block_suspend } for pid=21012 comm="syz-executor.4" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 714.740323] audit: type=1400 audit(1569846848.462:11450): avc: denied { map } for pid=21019 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79254 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:34:08 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:08 executing program 0: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3fefd326acebac00e665140c5ce9df03976ba42e6cc4d9d41602bb97b71ddc40fefef201f0c5f1836d5ae79503f7008b73fefbcc3c2b3ed33347f21e743a4085b2fe792bcd9458bef026bfbc7aa13bcbfcbe16578a66ee749701068ed83471576edf62b6c811475d561ca0f692e91a", 0x6f, 0xfffffffffffffffb) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='vfat\x00', 0x0) [ 714.923466] audit: type=1400 audit(1569846848.532:11451): avc: denied { map } for pid=21023 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:08 executing program 1: [ 715.035948] ptrace attach of "/root/syz-executor.5"[7936] was attempted by "/root/syz-executor.5"[21037] [ 715.057187] audit: type=1400 audit(1569846848.532:11452): avc: denied { map } for pid=21023 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:09 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) [ 715.150445] PPPIOCDETACH file->f_count=2 12:34:09 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) [ 715.175166] audit: type=1400 audit(1569846848.612:11453): avc: denied { map } for pid=21023 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.246002] audit: type=1400 audit(1569846848.622:11454): avc: denied { map } for pid=21023 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.436688] audit: type=1400 audit(1569846848.652:11455): avc: denied { map } for pid=21025 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.529797] audit: type=1400 audit(1569846848.662:11456): avc: denied { map } for pid=21025 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.608142] audit: type=1400 audit(1569846848.672:11457): avc: denied { map } for pid=21025 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:11 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r64, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) 12:34:11 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:11 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:11 executing program 0: 12:34:11 executing program 4: 12:34:11 executing program 1: 12:34:11 executing program 0: 12:34:11 executing program 1: 12:34:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:34:11 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:11 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:11 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:14 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) r65 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r65, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) 12:34:14 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000005c0)=""/165, 0x3e, 0xa5, 0x1}, 0x20) 12:34:14 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) finit_module(r0, 0x0, 0x0) 12:34:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0xb, 0x0, &(0x7f0000000140)) 12:34:14 executing program 5: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:14 executing program 4: accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) 12:34:14 executing program 5: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:14 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00') [ 720.663343] kauditd_printk_skb: 102 callbacks suppressed [ 720.663352] audit: type=1400 audit(1569846854.602:11560): avc: denied { module_load } for pid=21081 comm="syz-executor.1" path="/proc/21081/task/21085/attr/current" dev="proc" ino=79365 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1 12:34:14 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write$P9_RLOCK(r1, &(0x7f00000004c0)={0x8}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000600)='4', 0x1) [ 720.790987] audit: type=1400 audit(1569846854.722:11561): avc: denied { map } for pid=21089 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=80362 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:34:14 executing program 5: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) [ 720.962329] audit: type=1400 audit(1569846854.842:11562): avc: denied { map } for pid=21091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.166955] audit: type=1400 audit(1569846854.852:11563): avc: denied { map } for pid=21091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.323597] audit: type=1400 audit(1569846854.862:11564): avc: denied { map } for pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.647615] audit: type=1400 audit(1569846854.862:11565): avc: denied { map } for pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.828312] audit: type=1400 audit(1569846854.942:11566): avc: denied { map } for pid=21091 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.857269] audit: type=1400 audit(1569846854.962:11567): avc: denied { map } for pid=21097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.920220] audit: type=1400 audit(1569846854.962:11568): avc: denied { map } for pid=21097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.951284] audit: type=1400 audit(1569846854.982:11569): avc: denied { map } for pid=21097 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:17 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) 12:34:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) 12:34:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000000)={0xfff, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0x0, 0x0) 12:34:17 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:17 executing program 1: r0 = socket(0x100000010, 0x200080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="440400002800070500"/20, @ANYRES32=r3, @ANYBLOB="00000000090000000000000008000100636271001804020004040600000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c47ed8b9829ed94d76b132e00000000000000000000040000000000000000000000000010000000009da2d99a4d0eafc14c82000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a193ec32adcd00000000000000000000000000000000000000000000000000ffe800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002e3c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000f4ff000000000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100005000500000000006198ccdd00000000000000f77f0000000000000000000000080000004df853e6779f6084e84140ebd5fbbe0c1af648d5df07588523ebd8c2b2238b9b1c92357383f274666968c19d1a9c0e36287c8b2c972b7e7a37135500"/1168], 0x444}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:34:17 executing program 5: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:17 executing program 5: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:17 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{}, {}], 0x2, 0x0) 12:34:17 executing program 5: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:17 executing program 0: setresuid(0x0, 0xfffe, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b700000000ffffff840000000000000007000000000000009500000000000000f7a543c51978c638d0589567b4b1ab7237096432accc"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 12:34:17 executing program 4: perf_event_open(&(0x7f0000002900)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netfilter\x00') 12:34:17 executing program 1: 12:34:20 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) r64 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r64, 0x800454e1, &(0x7f0000000400)) 12:34:20 executing program 1: 12:34:20 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:20 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{}, {}], 0x2, 0x0) 12:34:20 executing program 0: 12:34:20 executing program 4: 12:34:20 executing program 4: 12:34:20 executing program 1: 12:34:20 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:20 executing program 0: 12:34:20 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{}, {}], 0x2, 0x0) [ 726.965615] kauditd_printk_skb: 85 callbacks suppressed [ 726.965624] audit: type=1400 audit(1569846860.902:11655): avc: denied { map } for pid=21155 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.118524] audit: type=1400 audit(1569846860.902:11656): avc: denied { map } for pid=21155 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:21 executing program 4: [ 727.282401] audit: type=1400 audit(1569846860.912:11657): avc: denied { map } for pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.408770] audit: type=1400 audit(1569846860.912:11658): avc: denied { map } for pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.581718] audit: type=1400 audit(1569846860.942:11659): avc: denied { map } for pid=21154 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79468 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 727.627360] audit: type=1400 audit(1569846860.952:11660): avc: denied { map } for pid=21155 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.650152] audit: type=1400 audit(1569846860.972:11661): avc: denied { map } for pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.675099] audit: type=1400 audit(1569846860.972:11662): avc: denied { map } for pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.700137] audit: type=1400 audit(1569846860.992:11663): avc: denied { map } for pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.725135] audit: type=1400 audit(1569846861.052:11664): avc: denied { map } for pid=21155 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:23 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) 12:34:23 executing program 4: 12:34:23 executing program 1: 12:34:23 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:23 executing program 0: 12:34:23 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r0}, {}], 0x2, 0x0) 12:34:23 executing program 4: 12:34:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) socket(0x200000000000011, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'bcsh0\x00', 0x600}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 12:34:23 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:23 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffe5d, 0x0) sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc4684ed49411482, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) dup(r0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000140)=0x32, 0x16e) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x82, &(0x7f0000000000)=0x8, 0x4) 12:34:23 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r0}, {}], 0x2, 0x0) 12:34:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5409, 0x0) 12:34:26 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r0}, {}], 0x2, 0x0) 12:34:26 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x0) write$binfmt_script(r0, 0x0, 0x0) 12:34:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) socket(0x200000000000011, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'bcsh0\x00', 0x600}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 12:34:26 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r60, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02a50700", @ANYRES32=r61, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000700", @ANYRES32=r62, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r63, @ANYBLOB="10000200000000002000010000000000"], 0x6c, 0x1) 12:34:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x80045438, 0x0) 12:34:26 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:26 executing program 2: r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x7) setreuid(r4, 0xffffffffffffffff) ioprio_get$uid(0x3, r4) 12:34:27 executing program 0: [ 733.068788] kauditd_printk_skb: 70 callbacks suppressed [ 733.068799] audit: type=1400 audit(1569846867.002:11735): avc: denied { map } for pid=21210 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=80585 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:34:27 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, 0x0) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:27 executing program 2: r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) [ 733.324918] audit: type=1400 audit(1569846867.012:11736): avc: denied { map } for pid=21215 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:27 executing program 4: 12:34:27 executing program 1: 12:34:27 executing program 0: [ 733.488244] audit: type=1400 audit(1569846867.052:11737): avc: denied { map } for pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:27 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, 0x0) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) [ 733.651080] audit: type=1400 audit(1569846867.072:11738): avc: denied { map } for pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.790455] audit: type=1400 audit(1569846867.092:11739): avc: denied { map } for pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.921806] audit: type=1400 audit(1569846867.102:11740): avc: denied { map } for pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 734.090144] audit: type=1400 audit(1569846867.112:11741): avc: denied { map } for pid=21214 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 734.133765] audit: type=1400 audit(1569846867.112:11742): avc: denied { map } for pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 734.168556] audit: type=1400 audit(1569846867.112:11743): avc: denied { map } for pid=21215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 734.193566] audit: type=1400 audit(1569846867.142:11744): avc: denied { map } for pid=21214 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:29 executing program 4: 12:34:29 executing program 2: r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:29 executing program 0: 12:34:29 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd0}, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x10420003) getgroups(0x0, &(0x7f0000000040)) chown(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x8) pipe(&(0x7f0000000080)) r3 = open(0x0, 0x82040, 0x0) fcntl$setlease(r3, 0x400, 0x0) fcntl$setlease(r3, 0x400, 0x2) 12:34:29 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0) 12:34:29 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, 0x0) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCBRADDBR(r1, 0x894c, 0x0) 12:34:29 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, 0x0) 12:34:30 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:30 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup3(r3, r4, 0x0) getsockopt$MISDN_TIME_STAMP(r5, 0x0, 0x32, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:34:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000000)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast2}}}, 0x104) prctl$PR_GET_DUMPABLE(0x3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RVERSION(r1, &(0x7f0000000340)={0x5, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) ioctl$sock_SIOCSIFBR(r2, 0x8941, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'syzkaller0\x00', {0x2, 0x4e21, @loopback}}) 12:34:30 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:30 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:34:30 executing program 1: 12:34:33 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:33 executing program 1: 12:34:33 executing program 0: 12:34:33 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:33 executing program 4: 12:34:33 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 12:34:33 executing program 4: 12:34:33 executing program 1: 12:34:33 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) 12:34:33 executing program 0: r0 = socket$kcm(0x2b, 0x44000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@quiet='quiet'}, {@dir_umask={'dir_umask'}}], [{@obj_user={'obj_user', 0x3d, 'keyring'}}]}) 12:34:33 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) [ 739.282295] kauditd_printk_skb: 100 callbacks suppressed [ 739.282304] audit: type=1400 audit(1569846873.222:11845): avc: denied { map } for pid=21296 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79688 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 739.428825] audit: type=1400 audit(1569846873.332:11846): avc: denied { map } for pid=21298 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:33 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, 0x0) 12:34:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:33 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080)) [ 739.596440] audit: type=1400 audit(1569846873.342:11847): avc: denied { map } for pid=21298 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 739.740158] audit: type=1400 audit(1569846873.362:11848): avc: denied { map } for pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:33 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget(0x1, 0x496f75b9df0d8030, 0x0) [ 739.896578] audit: type=1400 audit(1569846873.362:11849): avc: denied { map } for pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.016356] audit: type=1400 audit(1569846873.412:11850): avc: denied { map } for pid=21298 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:34 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, 0x0) [ 740.168596] audit: type=1400 audit(1569846873.432:11851): avc: denied { map } for pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.289005] audit: type=1400 audit(1569846873.442:11852): avc: denied { map } for pid=21298 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.363287] audit: type=1400 audit(1569846873.512:11853): avc: denied { map } for pid=21303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.420496] audit: type=1400 audit(1569846873.512:11854): avc: denied { map } for pid=21303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:36 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) 12:34:36 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f000001bff4)={0xb58d999c6714c4a8}) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:36 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080)) 12:34:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00004d1ff0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) 12:34:36 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, 0x0) 12:34:36 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080)) 12:34:36 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180)) 12:34:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:36 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) 12:34:36 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180)) 12:34:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:39 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080)) 12:34:39 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180)) 12:34:39 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:39 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r58, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) 12:34:39 executing program 0: 12:34:39 executing program 0: 12:34:39 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:39 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x3, 0x70, 0x8, 0x40, 0x0, 0xa4, 0x0, 0x0, 0x80000, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xb11}, 0x400, 0x0, 0x0, 0x7, 0x5}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 12:34:39 executing program 1: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080)) 12:34:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) [ 745.448947] kauditd_printk_skb: 92 callbacks suppressed [ 745.448956] audit: type=1400 audit(1569846879.382:11947): avc: denied { map } for pid=21374 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000003c0)='./file0\x00') [ 745.660594] audit: type=1400 audit(1569846879.382:11948): avc: denied { map } for pid=21374 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:39 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:39 executing program 1: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080)) [ 745.854280] audit: type=1400 audit(1569846879.392:11949): avc: denied { map } for pid=21375 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 745.968678] audit: type=1400 audit(1569846879.392:11951): avc: denied { map } for pid=21374 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) [ 746.089192] audit: type=1400 audit(1569846879.392:11950): avc: denied { map } for pid=21375 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:40 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) [ 746.251373] audit: type=1400 audit(1569846879.392:11952): avc: denied { map } for pid=21375 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.380597] audit: type=1400 audit(1569846879.392:11953): avc: denied { map } for pid=21374 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.529598] audit: type=1400 audit(1569846879.392:11954): avc: denied { map } for pid=21375 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.613374] audit: type=1400 audit(1569846879.442:11955): avc: denied { map } for pid=21372 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=79777 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 746.673789] audit: type=1400 audit(1569846879.602:11956): avc: denied { map } for pid=21381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:42 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000ac0)={'syz0\x00'}, 0x45c) 12:34:42 executing program 1: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080)) 12:34:42 executing program 5: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond_sl\xe1v\x83_0\xe3\xff\x00', 0x0}) 12:34:42 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:42 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) r59 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r59, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) 12:34:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:42 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(0xffffffffffffffff, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) [ 748.407587] input: syz1 as /devices/virtual/input/input6 12:34:42 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080)) [ 748.526894] input: syz1 as /devices/virtual/input/input7 12:34:42 executing program 0: 12:34:42 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, 0x0, 0x0) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:43 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080)) 12:34:43 executing program 0: 12:34:43 executing program 5: 12:34:43 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, 0x0, 0x0) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:45 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) 12:34:45 executing program 5: 12:34:45 executing program 0: 12:34:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:45 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, &(0x7f0000000080)) 12:34:45 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, 0x0, 0x0) poll(&(0x7f0000000140)=[{r1}, {}], 0x2, 0x0) 12:34:45 executing program 5: 12:34:45 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffe5d, 0x0) sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc4684ed49411482, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) dup(r0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000140)=0x32, 0x16e) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x82, &(0x7f0000000000)=0x8, 0x4) 12:34:45 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:45 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080)) 12:34:45 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(0x0, 0x0, 0x0) [ 751.618071] kauditd_printk_skb: 154 callbacks suppressed [ 751.618081] audit: type=1400 audit(1569846885.552:12111): avc: denied { map } for pid=21459 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81945 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 751.787991] audit: type=1400 audit(1569846885.622:12112): avc: denied { map } for pid=21462 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:45 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0) add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x363) mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) [ 751.968424] audit: type=1400 audit(1569846885.622:12113): avc: denied { map } for pid=21462 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.117550] audit: type=1400 audit(1569846885.622:12114): avc: denied { map } for pid=21462 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.232526] audit: type=1400 audit(1569846885.622:12115): avc: denied { map } for pid=21462 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.293730] audit: type=1400 audit(1569846885.652:12116): avc: denied { map } for pid=21463 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.317074] audit: type=1400 audit(1569846885.652:12117): avc: denied { map } for pid=21463 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.340187] audit: type=1400 audit(1569846885.662:12118): avc: denied { map } for pid=21462 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.363451] audit: type=1400 audit(1569846885.662:12119): avc: denied { map } for pid=21463 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.388271] audit: type=1400 audit(1569846885.682:12120): avc: denied { map } for pid=21463 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.412393] protocol 88fb is buggy, dev hsr_slave_0 [ 752.412445] protocol 88fb is buggy, dev hsr_slave_1 [ 752.412520] protocol 88fb is buggy, dev hsr_slave_0 [ 752.412558] protocol 88fb is buggy, dev hsr_slave_1 12:34:48 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r58 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r58, 0x800454e1, &(0x7f0000000400)) 12:34:48 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0) add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x363) mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) 12:34:48 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080)) 12:34:48 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:48 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(0x0, 0x0, 0x0) 12:34:48 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0) add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x363) mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) 12:34:48 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000080)) 12:34:48 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(0x0, 0x0, 0x0) 12:34:48 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:48 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, 0x0) [ 754.950167] protocol 88fb is buggy, dev hsr_slave_0 [ 754.956187] protocol 88fb is buggy, dev hsr_slave_1 12:34:48 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{r1}], 0x1, 0x0) 12:34:48 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) [ 755.280163] protocol 88fb is buggy, dev hsr_slave_0 [ 755.285331] protocol 88fb is buggy, dev hsr_slave_1 12:34:51 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, 0x0) 12:34:51 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x0, &(0x7f0000000a80), &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) fsetxattr$security_capability(r2, &(0x7f0000000780)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x8}, {0x0, 0x54}]}, 0x18, 0x0) add_key$user(0x0, &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000008c0)="97d3e62ea5bb945d8f73a3330e2f694f8aa7b49d8bbedd3d049f7a9ed73adf3a93d184c78eadd0e3a8c348ffee1df9b79b2c78dd95730df5712fa2eb361a9270b140715a8e3946de0073bb692e51a87971e93149d22f16477005242a6b18e095229149c39921ff920df876aa39412ecac6969d6e0f1aecea", &(0x7f00000009c0)=""/174}, 0x20) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x363) mknod(&(0x7f00000000c0)='./bus\x00', 0xff, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) 12:34:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:51 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140), 0x0, 0x0) 12:34:51 executing program 0: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/90) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) memfd_create(&(0x7f0000000080)='Et\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) r1 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r4, 0x0) timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) getgroups(0x2, &(0x7f0000000640)=[r3, 0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r5 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, 0x0, 0x0) keyctl$instantiate(0xc, r5, &(0x7f0000000280)=ANY=[@ANYBLOB="6c6f920300006372727074667320747275737465641f1c9188aaa491262030303030303030303030303030303030843034372035003400154f0669038f9375ea9625ed412159253adc16fc1b326c9d91c21f4522e040c7f7233fec39f11c1898474b8b6290d922c983b7840c96f5c29e58e713431b53023d08ce5218cea3aa9a36ff351eacce33661042942fc68c3d3df7e3e4a21fdf644aff63b536bcb8951a85d563cd9b0e40b5966accf4fefa"], 0x1, 0xfffffffffffffffe) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x200, 0x0) socket(0x10, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:34:51 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) [ 757.670112] protocol 88fb is buggy, dev hsr_slave_0 [ 757.675292] protocol 88fb is buggy, dev hsr_slave_1 12:34:51 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140), 0x0, 0x0) 12:34:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:51 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1105511, 0x0) [ 757.846559] kauditd_printk_skb: 104 callbacks suppressed [ 757.846568] audit: type=1400 audit(1569846891.782:12225): avc: denied { create } for pid=21534 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 758.029745] audit: type=1400 audit(1569846891.792:12226): avc: denied { create } for pid=21532 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:34:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) getegid() syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) [ 758.173622] audit: type=1400 audit(1569846891.862:12227): avc: denied { map } for pid=21541 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=82040 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:34:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000040)=0x6c, 0x4) 12:34:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) [ 758.325963] audit: type=1400 audit(1569846891.862:12228): avc: denied { write } for pid=21534 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:34:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x1, &(0x7f00000004c0)=[0xee01]) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x100000000002, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88) dup2(r0, r1) 12:34:52 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140), 0x0, 0x0) [ 758.496835] audit: type=1400 audit(1569846891.862:12229): avc: denied { setattr } for pid=21532 comm="syz-executor.5" name="NETLINK" dev="sockfs" ino=81173 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 758.657065] audit: type=1400 audit(1569846891.912:12230): avc: denied { read } for pid=21534 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:34:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") restart_syscall() [ 758.805179] audit: type=1400 audit(1569846891.942:12231): avc: denied { map } for pid=21545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x16, 0x1, 0x0, 0x5}, 0x3c) [ 758.904788] audit: type=1400 audit(1569846891.942:12232): avc: denied { map } for pid=21545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 759.062678] audit: type=1400 audit(1569846891.962:12233): avc: denied { map } for pid=21545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 759.167765] audit: type=1400 audit(1569846891.992:12234): avc: denied { map } for pid=21545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:54 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r54}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r55}, {}], {}, [{0x8, 0x7, r56}, {}, {0x8, 0x4, r57}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) 12:34:54 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{}], 0x1, 0x0) 12:34:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x1, &(0x7f00000004c0)=[0xee01]) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x100000000002, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88) dup2(r0, r1) 12:34:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_CHILD_SUBREAPER(0x18) 12:34:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x6, 0x24, 0x0, &(0x7f0000000140)) 12:34:54 executing program 5: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)='O', 0x1) uname(&(0x7f0000000000)=""/3) 12:34:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x6, 0x4, 0x0, &(0x7f0000000140)) 12:34:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:54 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{}], 0x1, 0x0) 12:34:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000100)=0xfff, 0x4) 12:34:55 executing program 0: socket$inet(0x2, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x333, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x40) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5414, &(0x7f0000000200)) fcntl$getflags(0xffffffffffffffff, 0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x670, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000300)=""/144) io_setup(0x4, &(0x7f0000000180)=0x0) io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000000000, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xe0000}]) pipe(&(0x7f0000000040)) socket$inet(0x2, 0x0, 0x0) 12:34:57 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0) 12:34:57 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:34:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:57 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) poll(&(0x7f0000000140)=[{}], 0x1, 0x0) 12:34:57 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:34:57 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000180)={0x0, 0x0, 0xffffdffffffffff9}) [ 763.852540] ptrace attach of "/root/syz-executor.0"[6984] was attempted by "/root/syz-executor.0"[21635] 12:34:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:34:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000240)={[{@nfs_export_on='nfs_export=on'}]}) 12:34:57 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x101000, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x1000000, 0x10, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) [ 763.897385] kauditd_printk_skb: 121 callbacks suppressed [ 763.897395] audit: type=1400 audit(1569846897.832:12356): avc: denied { map } for pid=21632 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81331 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:34:57 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:34:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @broadcast}, @rand_addr="1b2113104263083c1ff2033a53e5e8ad", 0x0, 0x0, 0xd1}) [ 764.096617] overlayfs: unrecognized mount option "nfs_export=on" or missing value [ 764.117795] audit: type=1400 audit(1569846898.052:12357): avc: denied { map } for pid=21647 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socket$inet6(0xa, 0x0, 0x8010000400000084) socket$inet(0x2, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8}) connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) [ 764.206909] audit: type=1400 audit(1569846898.082:12358): avc: denied { map } for pid=21647 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.366309] audit: type=1400 audit(1569846898.082:12359): avc: denied { map } for pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.528273] audit: type=1400 audit(1569846898.092:12360): avc: denied { map } for pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.698971] audit: type=1400 audit(1569846898.092:12361): avc: denied { map } for pid=21647 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.757651] audit: type=1400 audit(1569846898.092:12362): avc: denied { map } for pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.782988] audit: type=1400 audit(1569846898.112:12363): avc: denied { map } for pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.807212] audit: type=1400 audit(1569846898.112:12364): avc: denied { map } for pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.834338] audit: type=1400 audit(1569846898.122:12365): avc: denied { map } for pid=21647 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:35:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) creat(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="82"], 0x1) fallocate(r1, 0x0, 0x0, 0xfff) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 12:35:00 executing program 0: syz_open_dev$admmidi(0xfffffffffffffffe, 0x0, 0x0) 12:35:00 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socket$inet6(0xa, 0x0, 0x8010000400000084) socket$inet(0x2, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8}) connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) 12:35:00 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 12:35:00 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$inet(0x2, 0x4000000000000001, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x101000, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100)) dup(0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 12:35:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:35:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) 12:35:01 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:35:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:35:01 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0xc, 0x5, 0x0, 0x0, [{[@empty]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 12:35:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:35:01 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000000000}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x8002100, &(0x7f0000000a80), 0x0, &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f2b77da84cdd98d4809640159e88e61e47fddbad421e7b2") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cgroup.controllers\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="a1deb09fb229f3e327206d312b9d2546ceb8e2851ac20115cf87f51f3bceaf704bfaf2847ce9b975dd9a72c93ed3608d5f3634b81ebcdb1b0c218171c1ca41cb4eb76df433e3c78e7c3e476f2d5117e90b5854cd0dbc44ac612e54b997f643e61d47a59cc0943702650117c34b47a5a20dea48101102dba38c08dbaf98f16cc56d241d8d8a91caebb1710ec44ced951875b10f9585db7b9bd9", 0x99, 0xfffffffffffffffb) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff) 12:35:01 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:02 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4, 0x5}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 768.621573] IPVS: ftp: loaded support on port[0] = 21 [ 769.075655] kauditd_printk_skb: 144 callbacks suppressed [ 769.075665] audit: type=1400 audit(1569846903.012:12510): avc: denied { create } for pid=21711 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 769.105745] audit: type=1400 audit(1569846903.022:12511): avc: denied { sys_admin } for pid=21711 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 769.130985] audit: type=1400 audit(1569846903.022:12512): avc: denied { sys_admin } for pid=21711 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 769.252029] audit: type=1400 audit(1569846903.192:12513): avc: denied { map } for pid=21731 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.727523] audit: type=1400 audit(1569846903.662:12514): avc: denied { map } for pid=21733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:03 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r52, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) 12:35:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:35:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:35:03 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:03 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 12:35:03 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000000000}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x8002100, &(0x7f0000000a80), 0x0, &(0x7f0000000740), &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f2b77da84cdd98d4809640159e88e61e47fddbad421e7b2") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cgroup.controllers\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="a1deb09fb229f3e327206d312b9d2546ceb8e2851ac20115cf87f51f3bceaf704bfaf2847ce9b975dd9a72c93ed3608d5f3634b81ebcdb1b0c218171c1ca41cb4eb76df433e3c78e7c3e476f2d5117e90b5854cd0dbc44ac612e54b997f643e61d47a59cc0943702650117c34b47a5a20dea48101102dba38c08dbaf98f16cc56d241d8d8a91caebb1710ec44ced951875b10f9585db7b9bd9", 0x99, 0xfffffffffffffffb) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000002c0)=0xffffffffffffffff) 12:35:04 executing program 5: [ 770.095624] audit: type=1400 audit(1569846904.032:12515): avc: denied { sys_admin } for pid=21734 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 12:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:35:04 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 770.236924] audit: type=1400 audit(1569846904.092:12516): avc: denied { sys_admin } for pid=21734 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 770.335707] audit: type=1400 audit(1569846904.182:12517): avc: denied { sys_admin } for pid=21739 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 12:35:04 executing program 5: [ 770.441692] audit: type=1400 audit(1569846904.192:12518): avc: denied { sys_admin } for pid=21739 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 770.511563] audit: type=1400 audit(1569846904.222:12519): avc: denied { create } for pid=21739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/30) 12:35:04 executing program 5: 12:35:07 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) r53 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r53, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) 12:35:07 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fchdir(0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:07 executing program 5: 12:35:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 12:35:07 executing program 0: 12:35:07 executing program 2: 12:35:07 executing program 5: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) 12:35:07 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x20, 0x35da}) 12:35:07 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x401870cc, 0x0) 12:35:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 12:35:07 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fchdir(0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 12:35:10 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) 12:35:10 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fchdir(0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @remote, 0x4e24, 0x3, 'dh\x00', 0x0, 0x3, 0xf}, {@empty, 0x0, 0x1, 0xfffffffa, 0xc8}}, 0x44) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 12:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 12:35:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 12:35:10 executing program 5: 12:35:10 executing program 5: 12:35:10 executing program 4: 12:35:10 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:10 executing program 2: 12:35:10 executing program 0: 12:35:10 executing program 5: [ 776.415564] kauditd_printk_skb: 81 callbacks suppressed [ 776.415573] audit: type=1400 audit(1569846910.352:12601): avc: denied { map } for pid=21807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.610131] audit: type=1400 audit(1569846910.362:12602): avc: denied { map } for pid=21804 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81593 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 776.792968] audit: type=1400 audit(1569846910.392:12603): avc: denied { map } for pid=21807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.892065] audit: type=1400 audit(1569846910.392:12604): avc: denied { map } for pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.962254] audit: type=1400 audit(1569846910.442:12605): avc: denied { map } for pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.997043] audit: type=1400 audit(1569846910.462:12606): avc: denied { map } for pid=21807 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.021340] audit: type=1400 audit(1569846910.482:12607): avc: denied { map } for pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.046801] audit: type=1400 audit(1569846910.482:12608): avc: denied { map } for pid=21811 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.071410] audit: type=1400 audit(1569846910.492:12609): avc: denied { map } for pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.096097] audit: type=1400 audit(1569846910.512:12610): avc: denied { map } for pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) ftruncate(r1, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) 12:35:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888, 0x0, 0x5700}}, 0x20) 12:35:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 12:35:13 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:13 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) 12:35:13 executing program 0: msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000100)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) creat(0x0, 0x0) 12:35:13 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:13 executing program 2: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB=' '], 0x1) fallocate(r0, 0x3, 0x0, 0x8020001) lseek(r0, 0x0, 0x3) 12:35:13 executing program 4: msgsnd(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) prctl$PR_GET_TSC(0x19, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) 12:35:13 executing program 0: 12:35:13 executing program 2: 12:35:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) ftruncate(r1, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) 12:35:13 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:14 executing program 4: 12:35:14 executing program 0: 12:35:14 executing program 2: 12:35:16 executing program 1: creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:16 executing program 0: 12:35:16 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) 12:35:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket(0x10, 0x2, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xa6e4033331142420}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000000), 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x600) inotify_init1(0x80800) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="a8282b1e58de1500000365ffffff00e7df0700395032301de8ee64de48e904a04dc7bb0500000008007bc4092fbeb8657beae0c563fb13889960c74a8ebb5d191e55777414feb74febcb22cfed04c37d6316580029331128e3b901d309"], 0x5d) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600)={0x53, 0x5, 0x401, 0x6, 0xffffffffffff7fff}, 0x14) r4 = accept4(r2, &(0x7f0000000200)=@pptp, &(0x7f0000000480)=0x533, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, 0x0, &(0x7f0000000140)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r2, r3, 0x0, 0x10000) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x80a83, 0x0) ioctl$KDADDIO(r6, 0x4b34, 0x20) getsockopt$inet6_int(r5, 0x29, 0x10000000001, 0x0, &(0x7f00000000c0)) sendto(r5, 0x0, 0x0, 0x8001, &(0x7f0000000500)=@sco={0x1f, {0xd, 0x5, 0x5, 0x1, 0x101, 0x27}}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r7, 0x0, 0x0, 0x110003) write$cgroup_int(r7, &(0x7f0000000040), 0x12) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/235}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 12:35:16 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r52 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r52, 0x800454e1, &(0x7f0000000400)) 12:35:16 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) ftruncate(r1, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) 12:35:16 executing program 0: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, 0x0, 0x3f) 12:35:16 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x37, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, r0) waitid(0x0, 0x0, &(0x7f0000001ff0), 0x5, 0x0) 12:35:16 executing program 1: creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 782.590517] kauditd_printk_skb: 103 callbacks suppressed [ 782.590526] audit: type=1804 audit(1569846916.522:12714): pid=21879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir777428982/syzkaller.lH425S/574/bus" dev="sda1" ino=17639 res=1 12:35:16 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, 0x0, 0x0) [ 782.858872] audit: type=1400 audit(1569846916.562:12715): avc: denied { map } for pid=21874 comm="syz-executor.5" path="/root/syzkaller-testdir777428982/syzkaller.lH425S/574/bus" dev="sda1" ino=17639 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 12:35:16 executing program 1: creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 783.040326] ptrace attach of "/root/syz-executor.2"[21892] was attempted by "/root/syz-executor.2"[21899] 12:35:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, 0x0}, 0x0) [ 783.076647] audit: type=1400 audit(1569846916.602:12716): avc: denied { map } for pid=21886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:17 executing program 5: 12:35:17 executing program 2: [ 783.233542] audit: type=1400 audit(1569846916.602:12717): avc: denied { map } for pid=21886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 783.329244] audit: type=1804 audit(1569846916.632:12718): pid=21879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir777428982/syzkaller.lH425S/574/bus" dev="sda1" ino=17639 res=1 12:35:17 executing program 4: [ 783.481567] audit: type=1400 audit(1569846916.652:12719): avc: denied { map } for pid=21886 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:17 executing program 1: mkdir(0x0, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 783.585046] audit: type=1400 audit(1569846916.662:12720): avc: denied { map } for pid=21886 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 783.689257] audit: type=1400 audit(1569846916.662:12721): avc: denied { map } for pid=21884 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=82534 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 783.759203] audit: type=1400 audit(1569846916.692:12722): avc: denied { map } for pid=21886 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 783.787869] audit: type=1400 audit(1569846916.702:12723): avc: denied { map } for pid=21886 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:19 executing program 5: 12:35:19 executing program 0: 12:35:19 executing program 4: 12:35:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x100000400000003a) r2 = dup2(r0, r1) sendmsg$unix(r2, &(0x7f0000000840)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000080)="888ef87a", 0x4}], 0x1, &(0x7f00000007c0)=[@rights={{0xc}}], 0xc}, 0x0) 12:35:19 executing program 1: mkdir(0x0, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:19 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) 12:35:19 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) splice(r0, 0x0, r0, 0x0, 0x8100003, 0x0) 12:35:19 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) 12:35:19 executing program 1: mkdir(0x0, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=[{0x10}], 0x10}}], 0x2, 0x0) 12:35:19 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000002a80)) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r1 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r1, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2) 12:35:19 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(0x0, 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r2) sendmsg$unix(r1, &(0x7f0000000380)={&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 12:35:19 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) 12:35:20 executing program 4: 12:35:20 executing program 0: 12:35:20 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(0x0, 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:22 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) 12:35:22 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) 12:35:22 executing program 5: 12:35:22 executing program 4: 12:35:22 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(0x0, 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:22 executing program 0: 12:35:22 executing program 4: 12:35:22 executing program 5: 12:35:22 executing program 0: 12:35:22 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) [ 788.763822] kauditd_printk_skb: 119 callbacks suppressed [ 788.763831] audit: type=1400 audit(1569846922.702:12843): avc: denied { map } for pid=21972 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=81882 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:35:22 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 788.873845] audit: type=1400 audit(1569846922.812:12844): avc: denied { map } for pid=21975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:22 executing program 5: [ 788.961081] audit: type=1400 audit(1569846922.832:12845): avc: denied { map } for pid=21975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.090895] audit: type=1400 audit(1569846922.842:12846): avc: denied { map } for pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.238099] audit: type=1400 audit(1569846922.842:12847): avc: denied { map } for pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.381727] audit: type=1400 audit(1569846922.852:12848): avc: denied { map } for pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.539347] audit: type=1400 audit(1569846922.872:12849): avc: denied { map } for pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.587432] audit: type=1400 audit(1569846922.872:12850): avc: denied { map } for pid=21975 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.617858] audit: type=1400 audit(1569846922.942:12851): avc: denied { map } for pid=21977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.645595] audit: type=1400 audit(1569846922.942:12852): avc: denied { map } for pid=21977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:25 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r48}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r49}, {}], {}, [{0x8, 0x7, r50}, {}, {0x8, 0x4, r51}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) 12:35:25 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:25 executing program 4: 12:35:25 executing program 0: 12:35:25 executing program 2: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000) 12:35:25 executing program 5: 12:35:25 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0']) 12:35:25 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:35:25 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioperm(0x0, 0xa674, 0x0) 12:35:25 executing program 2: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000) 12:35:25 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:26 executing program 5: eventfd2(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='system\xdd\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x87) 12:35:28 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0) 12:35:28 executing program 2: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000) 12:35:28 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(0x0, 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:28 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:35:28 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioperm(0x0, 0xa674, 0x0) 12:35:28 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 12:35:28 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) 12:35:28 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(0x0, 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 794.891003] kauditd_printk_skb: 63 callbacks suppressed [ 794.891011] audit: type=1400 audit(1569846928.832:12916): avc: denied { map } for pid=22035 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=82988 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:35:28 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioperm(0x0, 0xa674, 0x0) [ 794.980198] audit: type=1400 audit(1569846928.902:12917): avc: denied { map } for pid=22042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:29 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) [ 795.193058] audit: type=1400 audit(1569846928.912:12918): avc: denied { map } for pid=22042 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:29 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(0x0, 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 795.354846] audit: type=1400 audit(1569846928.912:12919): avc: denied { map } for pid=22042 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 795.419427] audit: type=1400 audit(1569846928.912:12920): avc: denied { map } for pid=22042 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 795.443897] audit: type=1400 audit(1569846928.912:12921): avc: denied { map } for pid=22042 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:29 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) [ 795.490367] audit: type=1400 audit(1569846929.082:12922): avc: denied { map } for pid=22046 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 795.517250] audit: type=1400 audit(1569846929.092:12923): avc: denied { map } for pid=22046 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 795.576462] audit: type=1400 audit(1569846929.092:12924): avc: denied { map } for pid=22046 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 795.660646] audit: type=1400 audit(1569846929.152:12925): avc: denied { map } for pid=22046 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:31 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 12:35:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:35:31 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:31 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) getegid() 12:35:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x29, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a000000000704eb3014cd3ec8a755c1e1380081ffad000000e8d5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 12:35:31 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioperm(0x0, 0xa674, 0x0) 12:35:31 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:32 executing program 4: 12:35:32 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) getegid() 12:35:32 executing program 2: 12:35:32 executing program 4: 12:35:32 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:35:34 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r46, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) 12:35:34 executing program 0: 12:35:34 executing program 2: 12:35:34 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioperm(0x0, 0xa674, 0x0) 12:35:34 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) 12:35:34 executing program 4: 12:35:34 executing program 0: 12:35:34 executing program 4: 12:35:34 executing program 2: 12:35:35 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) [ 801.034674] kauditd_printk_skb: 78 callbacks suppressed [ 801.034683] audit: type=1400 audit(1569846934.972:13004): avc: denied { map } for pid=22106 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=83972 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:35:35 executing program 0: 12:35:35 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$getflags(r0, 0xb) [ 801.311021] audit: type=1400 audit(1569846935.062:13005): avc: denied { map } for pid=22111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.509772] audit: type=1400 audit(1569846935.062:13006): avc: denied { map } for pid=22111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.659611] audit: type=1400 audit(1569846935.062:13007): avc: denied { map } for pid=22111 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.796793] audit: type=1400 audit(1569846935.092:13008): avc: denied { map } for pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.896564] audit: type=1400 audit(1569846935.112:13009): avc: denied { map } for pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.921386] audit: type=1400 audit(1569846935.132:13010): avc: denied { map } for pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.947146] audit: type=1400 audit(1569846935.202:13011): avc: denied { map } for pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.971947] audit: type=1400 audit(1569846935.222:13012): avc: denied { map } for pid=22111 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 802.015657] audit: type=1400 audit(1569846935.232:13013): avc: denied { map } for pid=22115 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:37 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) r47 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) 12:35:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = getpgid(0x0) wait4(r1, 0x0, 0x0, &(0x7f0000000080)) 12:35:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_create(0x0) 12:35:37 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) 12:35:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffffff, 0x0, 0x7400, 0x0, 0x0) 12:35:37 executing program 2: eventfd2(0x4, 0x801) socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4d401111f3535a95) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x3, 0x0, 0x9, 0x4000, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18d6a04c, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1_to_team\x00', 0x410}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) socket$inet_udp(0x2, 0x2, 0x0) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='system\xdd\x00', 0x0) write(r3, &(0x7f0000002000)='/', 0x1) sendfile(r3, r3, &(0x7f0000000200), 0x87) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r3, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) 12:35:38 executing program 0: syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x800}], 0x0, 0x0) 12:35:38 executing program 5: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0xfffffffffffffe45, 0x0, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 12:35:38 executing program 4: r0 = socket(0xa, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1) 12:35:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000200)='/\xd2\a\xaa(\t0\xedj\\\x14E\x80VfM\'\x80\xb1\xce\x86Wp#\x00\xc2\xf8\x03\xb5\a\x9e\x83X\x8e?yE\xec\xeb2-\xbb\vO\xf9P\xd7\xd7\xf5\xa8\xaeW\x8e\xe5Q\xd9\x9ew\x8e}\x868\x9f2\xf9\x17\xf5\xf8;\xd5g\bQ\xf1a\x0e$9[k@\x0fj\x83\x9d\xb1\xd5\xd7\xa5\xc1\x05ox\xe4\xdc6\x04\xc1n\xf6\xf8\x1c\xf2\xa9\xbb\xbc\x12u\xfd\xeb0bK\xb8A\x93\xb3\x8co\a\xe1}R\xa6x\xde\xb5;\xea\xa0', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, "fa71ca12880e1f75b87187a2ba4dc3bd55d4a462b92a2c00fd7a3cc5aaf45e6b009c302a027a305da4a7d9fc9a460de69e23f08fa809a983d071f25d38b1978c", "f83c0f2ca28b2f3829463149455e07669686a39606824f28df3ba53313827c00cc50afcfc638bb491fcec6565f4e658373ccfdaad198d9cf0acdf6c169d79921", "2e4fc451b270daa4892406454d95b940ecc1bc6e2586e7c90f1dcf80de938c00"}) 12:35:38 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x4001c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:35:38 executing program 2: socket$inet6(0xa, 0x0, 0x6a9b) 12:35:40 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) 12:35:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800a1695e1dcfe87b1071") r1 = socket(0x2000000011, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x6}, 0x80, 0x0}}], 0x2, 0x0) 12:35:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 12:35:40 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket(0x10, 0x800000000080002, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x81}, 0x8) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0xc0045878, 0x0) pipe(0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000180)=0x7fff) sendto$inet(r2, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000380)="9d", 0x1, 0xfffffffffffffffe, 0x0, 0x0) close(r2) 12:35:40 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xffffffffffffffee, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000140001090001000200000000021000e11800000014000200fe8800a00fa10002000000000000a993"], 0x2c}}, 0x0) r0 = socket(0x1000000010, 0x80003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmmsg$alg(r0, &(0x7f0000000100), 0x4924924924926ed, 0x0) 12:35:40 executing program 0: r0 = socket(0x2000000011, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x608}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x6}, 0x80, 0x0}}], 0x2, 0x0) [ 807.087268] kauditd_printk_skb: 92 callbacks suppressed [ 807.087277] audit: type=1400 audit(1569846941.022:13106): avc: denied { map } for pid=22181 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84109 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:35:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="7c0000002400070900002389f0d20ddab6f10000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000e0007000000080001007366710048000200"/100], 0x7c}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x3, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000000)}], 0x9249249249249e1, 0x0) 12:35:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) [ 807.136652] audit: type=1400 audit(1569846941.032:13107): avc: denied { create } for pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:35:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000880)="9dd00e1de00d9b709036d1b45f3f8890a8f4ea94ae6848920610c0bcfd615f64f6bc124acd6624508f178612c33da2795a84d48f78cd5c4e5017725ac45a46d9475d4d387404b089347c31834e3a896d646ee695c7365a272b83082a2a54ce308257c1b3ad8326de4684336648acd9146a999cdbfe8ca35d1ff67b79ffaf6350427611dcbba9f40bb1311f63749bd77f304b80162132ffa9aa5a6a42f4d9d735cf5fbb62b95b5022ff321e80b5f0fea25c718212b45376616f92", 0xfffffffffffffedb, 0x0) 12:35:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) [ 807.250308] audit: type=1400 audit(1569846941.032:13108): avc: denied { write } for pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:35:41 executing program 4: [ 807.330275] audit: type=1400 audit(1569846941.042:13109): avc: denied { map } for pid=22184 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 807.460380] audit: type=1400 audit(1569846941.052:13110): avc: denied { read } for pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:35:41 executing program 5: [ 807.633493] audit: type=1400 audit(1569846941.152:13111): avc: denied { create } for pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 807.743441] audit: type=1400 audit(1569846941.152:13112): avc: denied { write } for pid=22172 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 807.902716] audit: type=1400 audit(1569846941.182:13113): avc: denied { map } for pid=22189 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 808.027563] audit: type=1400 audit(1569846941.182:13114): avc: denied { map } for pid=22189 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 808.103187] audit: type=1400 audit(1569846941.212:13115): avc: denied { map } for pid=22189 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:44 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r46 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r46, 0x800454e1, &(0x7f0000000400)) 12:35:44 executing program 2: 12:35:44 executing program 0: 12:35:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) 12:35:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 12:35:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf) 12:35:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r1, 0x0, 0xffff, 0x110003) write$cgroup_int(r1, &(0x7f0000000040), 0x12) lseek(r1, 0x0, 0x3) 12:35:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x40800, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:35:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000700)=[{{&(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x18}}], 0x1, 0x0) 12:35:44 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb202000000000000, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 12:35:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x400000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xd, 0x869, 0x1f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:35:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6(0xa, 0x1000000000002, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="bdad222e7bf671beeacbc8338e32b4ab41a79d47ca361898f52d6dd76f2cf62461f9c061c9e907796168e49ba4ab", 0x2e}], 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6(0xa, 0x4, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000100), 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r2, &(0x7f0000005040), 0x15f, 0x0) r3 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = dup2(r2, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) poll(&(0x7f00000000c0)=[{r2}, {r3}, {r5}], 0x3, 0x0) accept$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0003000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0) socket$inet6(0xa, 0x3, 0x0) 12:35:47 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) 12:35:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x4000000000dc) 12:35:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, &(0x7f0000000180)) 12:35:47 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 12:35:47 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xffffffffffffffee, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000140001090001000200000000021000e11800000014000200fe8800a00fa10002000000000000a993"], 0x2c}}, 0x0) r0 = socket(0x1000000010, 0x80003, 0x0) sendmmsg$alg(r0, &(0x7f0000000100), 0x4924924924926ed, 0x0) [ 813.220277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8300 sclass=netlink_route_socket pig=22258 comm=syz-executor.4 [ 813.254416] kauditd_printk_skb: 91 callbacks suppressed 12:35:47 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390014000800020000dc1338d54400009b7a136ef75afb83de448daa70540d8102d2c55327c43ab8220000060cec4fab91d400000000000000", 0x55}], 0x1}, 0x0) 12:35:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x24, 0x8, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0) 12:35:47 executing program 0: socket$netlink(0x10, 0x3, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket(0x10, 0x800000000080002, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, &(0x7f00000000c0)=""/24, &(0x7f00000001c0)=0x18) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") writev(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x81}, 0x8) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0xc0045878, 0x0) pipe(0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000180)=0x7fff) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000380)="9d", 0x1, 0xfffffffffffffffe, 0x0, 0x0) close(r3) [ 813.254426] audit: type=1400 audit(1569846947.192:13207): avc: denied { map } for pid=22261 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=83363 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:35:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x4000000000dc) [ 813.371769] audit: type=1400 audit(1569846947.292:13208): avc: denied { map } for pid=22269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:47 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x140000914, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10) connect(r2, &(0x7f0000000240)=@generic={0x2, "066aa30e5d3ae33288082f8f947a065da8a9df185cc56bc519ba5e00b5fb68aa3fcbc376b1c706f7638adf98ca9f964ff373a58d39ef8ebfc2f5056c18e0551ea9ed334cffc4447c0665be285c8f049aa3ad8fbdf40bd27723eac7a76acb4504bfcc8ddb342002160fa043838caa9452c8f86f30dc169dc28dcb83c83cde"}, 0x80) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 813.506802] audit: type=1400 audit(1569846947.292:13209): avc: denied { map } for pid=22269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='bridge_slave_0\x00', 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 12:35:47 executing program 2: [ 813.631448] audit: type=1400 audit(1569846947.292:13210): avc: denied { map } for pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 813.750125] protocol 88fb is buggy, dev hsr_slave_0 [ 813.755309] protocol 88fb is buggy, dev hsr_slave_1 [ 813.816678] audit: type=1400 audit(1569846947.292:13211): avc: denied { map } for pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 813.840779] protocol 88fb is buggy, dev hsr_slave_0 [ 813.840827] protocol 88fb is buggy, dev hsr_slave_1 [ 813.873120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8300 sclass=netlink_route_socket pig=22284 comm=syz-executor.4 [ 813.994094] audit: type=1400 audit(1569846947.302:13212): avc: denied { map } for pid=22269 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.137350] audit: type=1400 audit(1569846947.302:13213): avc: denied { map } for pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.305788] audit: type=1400 audit(1569846947.302:13214): avc: denied { map } for pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.399072] audit: type=1400 audit(1569846947.332:13215): avc: denied { map } for pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.464868] audit: type=1400 audit(1569846947.342:13216): avc: denied { map } for pid=22269 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:50 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r42}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r43}, {}], {}, [{0x8, 0x7, r44}, {}, {0x8, 0x4, r45}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) 12:35:50 executing program 5: 12:35:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x4000000000dc) 12:35:50 executing program 1: 12:35:50 executing program 0: 12:35:50 executing program 2: 12:35:50 executing program 1: 12:35:50 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000040)=0x66) 12:35:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) sysinfo(&(0x7f0000000040)=""/237) 12:35:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5e0bcfe47bf070") ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) prctl$PR_GET_SECCOMP(0x15) [ 816.387592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8300 sclass=netlink_route_socket pig=22303 comm=syz-executor.4 12:35:50 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') rmdir(&(0x7f0000000100)='./file0\x00') 12:35:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 12:35:53 executing program 2: sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\b\x00\x00', @ANYBLOB="000127bd7000fddbdf251100000058000100080001000a000000080073cb7d95f9aadf3108e9c404004e2100000800060072720000fbff00000a00000014000300fe7a73c80242e097109a12f70225443dd08800000000000000efffffffff000108000bdbadb6cf036deb11b498fc25193b108449e62e6d0f99bcbf0a26"], 0x2}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x202000, 0xe2) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4000, 0x40) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0)=@gcm_128={{0x303}, "6626219d9cb2bf60", "1e140d4d613c5b3fe8697c12d41ac347", "418ff744", "ae6523c59735c731"}, 0x28) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) shutdown(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8d}, 0x28240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4004, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') 12:35:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5e0bcfe47bf070") prctl$PR_SET_PDEATHSIG(0x1, 0x0) 12:35:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 12:35:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) timer_create(0x0, 0x0, &(0x7f00000003c0)) timer_gettime(0x0, &(0x7f0000000540)) 12:35:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) pause() 12:35:53 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0) [ 819.352399] kauditd_printk_skb: 103 callbacks suppressed [ 819.352408] audit: type=1326 audit(1569846953.292:13320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22334 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000 12:35:53 executing program 4: sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\b\x00\x00', @ANYRES16, @ANYBLOB="000127bd7000fddbdf251100000058000100080001000a000000080073cb7d95f9aadf3108e9c404004e2100000800060072720000fbff00000a00000014000300fe7a73c80242e097109a12f70225443dd08800000000000000efffffffff000108000bdbadb6cf036deb11b498fc25193b108449e62e6d0f99bcbf0a26"], 0x3}}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x202000, 0xe2) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4000, 0x40) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000003c0)=@gcm_128={{0x303}, "6626219d9cb2bf60", "1e140d4d613c5b3fe8697c12d41ac347", "418ff744", "ae6523c59735c731"}, 0x28) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r1, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfffffffffffffffd, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8d}, 0x28240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4004, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bpq0\x00'}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000500)={'\x99\x858\xd5te\x00\x00\x00\x00\x00\x00\xd5\xfd\xe6\x17\xd3\x92\x7f\xb7\xebs\x1f\x9az\x00', 0x0, 0x3, 0xde, [], 0x4, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000400)=""/222}, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') [ 819.446085] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 819.466067] EXT4-fs (loop2): bad geometry: block count 2305844108725322808 exceeds size of device (66048 blocks) [ 819.514592] audit: type=1326 audit(1569846953.332:13321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22332 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000 [ 819.570417] audit: type=1326 audit(1569846953.362:13322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22335 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000 12:35:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) lgetxattr(0x0, 0x0, 0x0, 0x0) [ 819.615055] audit: type=1400 audit(1569846953.432:13323): avc: denied { map } for pid=22346 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=83492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 819.722813] audit: type=1400 audit(1569846953.432:13324): avc: denied { map } for pid=22349 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.751482] audit: type=1400 audit(1569846953.432:13325): avc: denied { map } for pid=22349 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.775602] audit: type=1400 audit(1569846953.452:13326): avc: denied { map } for pid=22349 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.802530] audit: type=1400 audit(1569846953.452:13327): avc: denied { map } for pid=22349 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.828506] audit: type=1400 audit(1569846953.452:13328): avc: denied { map } for pid=22349 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x1e00, 0x0, 0x0, "dd1ecb941de598e32b581d85f96cad4f38c4db"}) [ 819.859569] audit: type=1400 audit(1569846953.542:13329): avc: denied { map } for pid=22351 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x9, &(0x7f00000000c0)={0x0, 0x0}, 0x8) 12:35:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) 12:35:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000240)={[{@xino_on='xino=on'}, {@nfs_export_on='nfs_export=on'}], [{@euid_gt={'euid>'}}]}) getrandom(0x0, 0x0, 0x0) [ 820.313548] overlayfs: unrecognized mount option "xino=on" or missing value 12:35:56 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 12:35:56 executing program 5: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240)={&(0x7f0000000200), 0xffffffffffffff71}) 12:35:56 executing program 4: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff}) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0) getpgrp(0x0) 12:35:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x17, 0x0, 0x0) 12:35:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_DUMPABLE(0x3) 12:35:56 executing program 2: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff}) 12:35:56 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff}) 12:35:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) 12:35:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) 12:35:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) 12:35:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x81, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8) setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000040)=0x6, 0x4) r3 = accept4(r1, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000340)={0xfff, {{0x2, 0x4e24, @rand_addr=0x401}}}, 0x88) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x881, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x80100, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x201, 0x0) write$P9_RCLUNK(r5, &(0x7f0000000280)={0x7, 0x79, 0x1}, 0x7) accept(r1, 0x0, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000006, 0x8013, r4, 0x0) 12:35:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) 12:35:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) 12:35:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x2}, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 12:35:59 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r40, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) 12:35:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r1, r0) 12:35:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) dup3(r1, r2, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 12:35:59 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x28, 0x40000000003a, 0x43ff, @ipv4={[], [], @broadcast}, @local, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, [], @mcast2, @local}}}}}}, 0x0) 12:35:59 executing program 5: 12:35:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) 12:35:59 executing program 2: 12:35:59 executing program 5: [ 825.659864] kauditd_printk_skb: 125 callbacks suppressed [ 825.659874] audit: type=1400 audit(1569846959.592:13455): avc: denied { map } for pid=22445 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84493 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 825.750777] audit: type=1400 audit(1569846959.672:13456): avc: denied { map } for pid=22451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:59 executing program 4: 12:35:59 executing program 5: [ 825.860290] audit: type=1400 audit(1569846959.672:13457): avc: denied { map } for pid=22451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 825.896645] audit: type=1400 audit(1569846959.672:13458): avc: denied { map } for pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:35:59 executing program 2: [ 825.997848] audit: type=1400 audit(1569846959.672:13459): avc: denied { map } for pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.136390] audit: type=1400 audit(1569846959.672:13460): avc: denied { map } for pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.187333] audit: type=1400 audit(1569846959.672:13461): avc: denied { map } for pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.219008] audit: type=1400 audit(1569846959.682:13462): avc: denied { map } for pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.253716] audit: type=1400 audit(1569846959.682:13463): avc: denied { map } for pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.286022] audit: type=1400 audit(1569846959.682:13464): avc: denied { map } for pid=22451 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 12:36:02 executing program 1: 12:36:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_getoverrun(0x0) 12:36:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) clock_gettime(0x0, &(0x7f0000002ac0)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002b00)={0x0, r2+10000000}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000002b40)={@loopback, 0x80}) sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@ll={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)="b98b71fe34dfb4724fe9e9a353649a9f41b1b039331ad7", 0x17}], 0x1}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) add_key(0x0, 0x0, &(0x7f0000001180), 0x0, 0xfffffffffffffffe) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) lstat(0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r4, 0x0) rename(&(0x7f0000000440)='./bus/file0\x00', 0x0) timer_gettime(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 12:36:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) keyctl$session_to_parent(0x12) 12:36:02 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) r41 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) 12:36:02 executing program 1: sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16, @ANYBLOB="000127bd7000fddbdf251100000058000100080001000a000000080004004e2100000800060072720000080001000a00000014000300fe88000000000000000000000000010108000b007369700008000b007369700008000b0073"], 0x3}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) [ 828.707115] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 12:36:02 executing program 4: 12:36:02 executing program 4: 12:36:03 executing program 4: [ 829.085970] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 12:36:03 executing program 1: 12:36:03 executing program 1: 12:36:03 executing program 5: 12:36:03 executing program 4: 12:36:03 executing program 1: 12:36:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) clock_gettime(0x0, &(0x7f0000002ac0)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002b00)={0x0, r2+10000000}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000002b40)={@loopback, 0x80}) sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@ll={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)="b98b71fe34dfb4724fe9e9a353649a9f41b1b039331ad7", 0x17}], 0x1}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) add_key(0x0, 0x0, &(0x7f0000001180), 0x0, 0xfffffffffffffffe) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) lstat(0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r4, 0x0) rename(&(0x7f0000000440)='./bus/file0\x00', 0x0) timer_gettime(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 12:36:03 executing program 0: [ 830.662701] kauditd_printk_skb: 77 callbacks suppressed [ 830.662709] audit: type=1400 audit(1569846964.602:13542): avc: denied { map } for pid=22515 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.691489] audit: type=1400 audit(1569846964.602:13543): avc: denied { map } for pid=22515 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:05 executing program 4: 12:36:05 executing program 1: 12:36:05 executing program 5: 12:36:05 executing program 0: 12:36:05 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) dup(0xffffffffffffffff) 12:36:05 executing program 2: 12:36:05 executing program 5: 12:36:05 executing program 0: 12:36:05 executing program 1: 12:36:05 executing program 4: 12:36:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) readahead(0xffffffffffffffff, 0x0, 0x0) 12:36:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x2b}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 831.883297] audit: type=1400 audit(1569846965.822:13544): avc: denied { map } for pid=22521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.003499] audit: type=1400 audit(1569846965.822:13545): avc: denied { map } for pid=22521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 12:36:06 executing program 1: pkey_alloc(0x0, 0x5) [ 832.149793] audit: type=1400 audit(1569846965.822:13546): avc: denied { map } for pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.279937] audit: type=1400 audit(1569846965.822:13547): avc: denied { map } for pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:06 executing program 4: io_setup(0x0, &(0x7f0000000440)) [ 832.446882] audit: type=1400 audit(1569846965.852:13548): avc: denied { map } for pid=22521 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:06 executing program 0: [ 832.605243] audit: type=1400 audit(1569846965.862:13549): avc: denied { map } for pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.731796] audit: type=1400 audit(1569846965.872:13550): avc: denied { map } for pid=22521 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.855405] audit: type=1400 audit(1569846965.892:13551): avc: denied { map } for pid=22522 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84641 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:36:08 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dca5055e0bcf") sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 12:36:08 executing program 1: keyctl$chown(0x12, 0x0, 0xee00, 0x0) 12:36:08 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 12:36:08 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0xc000, 0x0) 12:36:08 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) r40 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r40, 0x800454e1, &(0x7f0000000400)) 12:36:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 12:36:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 12:36:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) [ 834.890566] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:36:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x0) 12:36:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r1, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) 12:36:09 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setresgid(0x0, r1, r3) 12:36:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) [ 835.670604] kauditd_printk_skb: 108 callbacks suppressed [ 835.670613] audit: type=1400 audit(1569846969.612:13660): avc: denied { create } for pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:36:09 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dca5055e0bcf") sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 12:36:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 12:36:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") creat(&(0x7f00000001c0)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) [ 835.862156] audit: type=1400 audit(1569846969.642:13661): avc: denied { create } for pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:36:09 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dca5055e0bcf") sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 836.010099] audit: type=1400 audit(1569846969.642:13662): avc: denied { write } for pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 836.107574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 836.206012] audit: type=1400 audit(1569846969.652:13663): avc: denied { write } for pid=22575 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 836.278015] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 836.413120] audit: type=1400 audit(1569846969.762:13664): avc: denied { map } for pid=22579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.545741] audit: type=1400 audit(1569846969.782:13665): avc: denied { map } for pid=22579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.623791] audit: type=1400 audit(1569846969.792:13666): avc: denied { map } for pid=22579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.655918] audit: type=1400 audit(1569846969.802:13667): avc: denied { map } for pid=22579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.710198] audit: type=1400 audit(1569846969.842:13668): avc: denied { map } for pid=22579 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.746318] audit: type=1400 audit(1569846969.842:13669): avc: denied { map } for pid=22579 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 12:36:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, 0x0, 0x0) 12:36:11 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) 12:36:11 executing program 4: syz_genetlink_get_family_id$ipvs(0x0) 12:36:11 executing program 1: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/203) 12:36:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) 12:36:11 executing program 0: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)="fe", 0x1, 0xfffffffffffffffd) keyctl$chown(0x11, r0, 0xee00, 0x0) 12:36:11 executing program 2: setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 12:36:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 12:36:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:36:12 executing program 2: setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 12:36:12 executing program 0: 12:36:12 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020000009, 0x7ff0bdbe}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) 12:36:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000027c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x3a) [ 838.914714] vhci_hcd: default hub control req: 0000 v0000 i0000 l2304 12:36:14 executing program 0: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000080)={0x615}) 12:36:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000f1ff000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) 12:36:14 executing program 2: setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 12:36:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) 12:36:14 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) r39 = gettid() tkill(r39, 0x1000000000016) 12:36:14 executing program 5: 12:36:15 executing program 5: 12:36:15 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 12:36:15 executing program 0: 12:36:15 executing program 4: 12:36:15 executing program 1: [ 841.206378] kauditd_printk_skb: 117 callbacks suppressed [ 841.206387] audit: type=1400 audit(1569846975.142:13787): avc: denied { map } for pid=22651 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=84829 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:36:15 executing program 5: 12:36:15 executing program 0: 12:36:15 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) [ 841.387230] audit: type=1400 audit(1569846975.252:13788): avc: denied { map } for pid=22655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:15 executing program 1: 12:36:15 executing program 4: [ 841.559303] audit: type=1400 audit(1569846975.252:13789): avc: denied { map } for pid=22655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 841.685788] audit: type=1400 audit(1569846975.262:13790): avc: denied { map } for pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 841.828955] audit: type=1400 audit(1569846975.262:13791): avc: denied { map } for pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 841.984524] audit: type=1400 audit(1569846975.272:13792): avc: denied { map } for pid=22655 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.086204] audit: type=1400 audit(1569846975.282:13793): avc: denied { map } for pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.193277] audit: type=1400 audit(1569846975.302:13794): avc: denied { map } for pid=22655 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.224633] audit: type=1400 audit(1569846975.312:13795): avc: denied { map } for pid=22660 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.247512] audit: type=1400 audit(1569846975.312:13796): avc: denied { map } for pid=22660 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:18 executing program 0: 12:36:18 executing program 5: 12:36:18 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 12:36:18 executing program 1: 12:36:18 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) gettid() 12:36:18 executing program 4: 12:36:18 executing program 5: 12:36:18 executing program 0: 12:36:18 executing program 4: 12:36:18 executing program 1: 12:36:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 12:36:18 executing program 5: 12:36:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) fallocate(r0, 0x11, 0x0, 0x9000000) 12:36:18 executing program 4: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) 12:36:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 12:36:18 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') readlink(&(0x7f00000005c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)=""/113, 0x71) 12:36:21 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001040)=0xc) 12:36:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 12:36:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newsa={0xf0, 0x1a, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}}, @in6=@ipv4}}, 0xf0}}, 0x0) 12:36:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ustat(0x9, 0x0) 12:36:21 executing program 1: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) fallocate(r3, 0x1, 0x0, 0x2af005a3) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)) r5 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) fallocate(r5, 0x1, 0x0, 0x2af005a3) 12:36:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:21 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='u'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 847.455148] kauditd_printk_skb: 113 callbacks suppressed [ 847.455156] audit: type=1400 audit(1569846981.392:13910): avc: denied { map } for pid=22722 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=85203 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:36:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername$netlink(r0, 0x0, &(0x7f0000000040)) 12:36:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 847.547973] audit: type=1804 audit(1569846981.412:13911): pid=22720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1 12:36:21 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:21 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x1) r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) [ 847.745095] audit: type=1804 audit(1569846981.422:13912): pid=22720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1 [ 847.908370] audit: type=1804 audit(1569846981.532:13913): pid=22720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1 [ 848.084055] audit: type=1804 audit(1569846981.532:13914): pid=22729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1 [ 848.270134] audit: type=1804 audit(1569846981.542:13915): pid=22731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir050235274/syzkaller.ltvGaX/448/bus" dev="sda1" ino=16848 res=1 [ 848.403114] audit: type=1400 audit(1569846981.632:13916): avc: denied { map } for pid=22733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 848.435631] audit: type=1400 audit(1569846981.642:13917): avc: denied { map } for pid=22733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 848.466704] audit: type=1400 audit(1569846981.642:13918): avc: denied { map } for pid=22733 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 848.498047] audit: type=1400 audit(1569846981.652:13920): avc: denied { map } for pid=22733 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:24 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) fcntl$lock(r0, 0x24, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff}) 12:36:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newlink={0x34, 0x11, 0xe3b, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_team\x00'}]}, 0x34}}, 0x0) 12:36:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:24 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:24 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file1\x00', &(0x7f0000000f40)) 12:36:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff, @mcast2, 0x10000}, 0x1c) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000100)) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x14, 0x16, 0x400000000000005, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) dup2(r2, r1) r3 = socket(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r4 = socket$caif_stream(0x25, 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000016000500000000000000000200000000"], 0x14}}, 0x0) r7 = dup2(r6, r5) r8 = socket(0x10, 0x3, 0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, r9, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40) sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r9, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081) sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000001780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x70, r9, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x1f, &(0x7f0000000200), 0x127) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) utimes(&(0x7f00000000c0)='./file0\x00', 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r12, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r13, 0xc00, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040018}, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, 0x0, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, 0x0, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081) 12:36:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 850.492551] device team_slave_0 left promiscuous mode [ 850.542784] team0: Port device team_slave_0 removed 12:36:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, 0x0) getgroups(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x3, 0x1, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) [ 850.630315] protocol 88fb is buggy, dev hsr_slave_0 [ 850.635443] protocol 88fb is buggy, dev hsr_slave_1 12:36:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newlink={0x34, 0x11, 0xe3b, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_team\x00'}]}, 0x34}}, 0x0) [ 850.678374] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 [ 850.738653] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 12:36:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000002, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de4538700000000e8904667033a61edb75c8d51c05dfaf7f4fdb16e0ca700", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f900040000b8a7"}) 12:36:24 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:24 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 850.950115] protocol 88fb is buggy, dev hsr_slave_0 [ 850.955270] protocol 88fb is buggy, dev hsr_slave_1 12:36:24 executing program 2: setregid(0xee00, 0x0) setregid(0x0, 0x0) [ 851.190140] protocol 88fb is buggy, dev hsr_slave_0 [ 851.195315] protocol 88fb is buggy, dev hsr_slave_1 [ 851.270112] protocol 88fb is buggy, dev hsr_slave_0 [ 851.284780] protocol 88fb is buggy, dev hsr_slave_1 12:36:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff, @mcast2, 0x10000}, 0x1c) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000100)) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x14, 0x16, 0x400000000000005, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) dup2(r2, r1) r3 = socket(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r4 = socket$caif_stream(0x25, 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000016000500000000000000000200000000"], 0x14}}, 0x0) r7 = dup2(r6, r5) r8 = socket(0x10, 0x3, 0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, r9, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40) sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r9, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081) sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000001780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x70, r9, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x1f, &(0x7f0000000200), 0x127) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) utimes(&(0x7f00000000c0)='./file0\x00', 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r12, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r13, 0xc00, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040018}, 0x10) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r14, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081) 12:36:25 executing program 1: 12:36:25 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 852.117419] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 [ 852.230161] protocol 88fb is buggy, dev hsr_slave_0 [ 852.235383] protocol 88fb is buggy, dev hsr_slave_1 12:36:27 executing program 2: 12:36:27 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:27 executing program 1: 12:36:27 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:27 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) 12:36:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff, @mcast2, 0x10000}, 0x1c) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000100)) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x14, 0x16, 0x400000000000005, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) dup2(r2, r1) r3 = socket(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r4 = socket$caif_stream(0x25, 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000016000500000000000000000200000000"], 0x14}}, 0x0) r7 = dup2(r6, r5) r8 = socket(0x10, 0x3, 0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x60, r9, 0x100, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}]}, 0x60}}, 0x40) sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r9, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081) sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000001780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x70, r9, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x1f, &(0x7f0000000200), 0x127) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) utimes(&(0x7f00000000c0)='./file0\x00', 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r12, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r13, 0xc00, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040018}, 0x10) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r14, 0xa10, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2f3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xa4}}, 0x4000081) 12:36:27 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:27 executing program 2: 12:36:27 executing program 1: [ 853.559719] kauditd_printk_skb: 127 callbacks suppressed [ 853.559728] audit: type=1400 audit(1569846987.492:14047): avc: denied { create } for pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:36:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:27 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 853.681695] audit: type=1400 audit(1569846987.622:14048): avc: denied { map } for pid=22815 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=85318 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:36:27 executing program 2: [ 853.788103] audit: type=1400 audit(1569846987.642:14049): avc: denied { create } for pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 853.904619] audit: type=1400 audit(1569846987.652:14050): avc: denied { write } for pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 853.948877] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 12:36:27 executing program 1: 12:36:27 executing program 0: 12:36:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:28 executing program 2: [ 854.081517] audit: type=1400 audit(1569846987.682:14051): avc: denied { create } for pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 854.230143] audit: type=1400 audit(1569846987.682:14052): avc: denied { write } for pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 854.370957] audit: type=1400 audit(1569846987.682:14053): avc: denied { read } for pid=22811 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 854.520252] audit: type=1400 audit(1569846987.762:14054): avc: denied { map } for pid=22822 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 854.554939] audit: type=1400 audit(1569846987.802:14055): avc: denied { map } for pid=22822 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 854.578201] audit: type=1400 audit(1569846987.802:14056): avc: denied { map } for pid=22822 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.390158] net_ratelimit: 22 callbacks suppressed [ 856.395158] protocol 88fb is buggy, dev hsr_slave_0 [ 856.400252] protocol 88fb is buggy, dev hsr_slave_1 [ 856.405362] protocol 88fb is buggy, dev hsr_slave_0 [ 856.410434] protocol 88fb is buggy, dev hsr_slave_1 12:36:30 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) 12:36:30 executing program 2: 12:36:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:30 executing program 0: 12:36:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:30 executing program 1: 12:36:30 executing program 2: unshare(0x20000400) clone(0xffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:36:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0xfffffffffffffdf6, &(0x7f0000000080)=[{&(0x7f0000000140)="82fa", 0x2e7}], 0x1}}], 0x1, 0x80) sendmmsg(r0, &(0x7f0000000300), 0x22, 0x0) 12:36:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) r1 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r1, &(0x7f0000000300)=[{{0x0, 0xfffffffffffffdf6, &(0x7f0000000080)=[{&(0x7f0000000140)="82fa", 0x2e7}], 0x1}}], 0x1, 0x80) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x40, 0x0) 12:36:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 856.870147] protocol 88fb is buggy, dev hsr_slave_0 [ 856.875355] protocol 88fb is buggy, dev hsr_slave_1 12:36:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'bpq0\x00'}, 0x18) [ 857.190161] protocol 88fb is buggy, dev hsr_slave_0 [ 857.195357] protocol 88fb is buggy, dev hsr_slave_1 [ 857.345707] IPVS: stopping backup sync thread 22874 ... [ 857.350471] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 857.369034] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 857.440167] protocol 88fb is buggy, dev hsr_slave_0 [ 857.445291] protocol 88fb is buggy, dev hsr_slave_1 12:36:33 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) 12:36:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)="bd07d5c91daac9f9", 0x8}, {&(0x7f0000000180)="d196188b1760cada6a64a58a1c7cf258", 0x10}], 0x2}}, {{&(0x7f0000000780)=@x25={0x9, @null=' \x00'}, 0x80, 0x0}}], 0x2, 0x0) 12:36:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:33 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0) fallocate(r0, 0x0, 0x2000421, 0xd) write(r0, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 12:36:33 executing program 2: 12:36:33 executing program 2: 12:36:33 executing program 0: 12:36:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 859.757846] kauditd_printk_skb: 87 callbacks suppressed [ 859.757855] audit: type=1400 audit(1569846993.692:14145): avc: denied { map } for pid=22891 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=86285 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 859.835446] audit: type=1400 audit(1569846993.692:14144): avc: denied { map } for pid=22884 comm="syz-executor.1" path=2F6D656D66643A2F6465762F6E65742F74756E202864656C6574656429 dev="tmpfs" ino=85428 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:36:33 executing program 1: [ 859.993382] audit: type=1400 audit(1569846993.842:14146): avc: denied { map } for pid=22896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:34 executing program 0: [ 860.150129] audit: type=1400 audit(1569846993.852:14147): avc: denied { map } for pid=22894 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.329436] audit: type=1400 audit(1569846993.862:14148): avc: denied { map } for pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.433852] audit: type=1400 audit(1569846993.862:14149): avc: denied { map } for pid=22894 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.547511] audit: type=1400 audit(1569846993.902:14150): avc: denied { map } for pid=22896 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.605312] audit: type=1400 audit(1569846993.912:14151): avc: denied { map } for pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.667363] audit: type=1400 audit(1569846993.912:14152): avc: denied { map } for pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.702786] audit: type=1400 audit(1569846993.972:14153): avc: denied { map } for pid=22896 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.590247] net_ratelimit: 22 callbacks suppressed [ 861.590253] protocol 88fb is buggy, dev hsr_slave_0 [ 861.600574] protocol 88fb is buggy, dev hsr_slave_1 [ 861.680133] protocol 88fb is buggy, dev hsr_slave_0 [ 861.685263] protocol 88fb is buggy, dev hsr_slave_1 [ 862.630201] protocol 88fb is buggy, dev hsr_slave_0 [ 862.635568] protocol 88fb is buggy, dev hsr_slave_1 [ 862.640723] protocol 88fb is buggy, dev hsr_slave_0 [ 862.645874] protocol 88fb is buggy, dev hsr_slave_1 12:36:36 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) getuid() 12:36:36 executing program 2: 12:36:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xc0, 0x0, 0x0, 0xee00}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, 0xe8) 12:36:36 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x11, 0x507, 0x0, 0x0, {0x0, r3}}, 0xd4}}, 0x0) 12:36:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:36 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x11, 0x507, 0x0, 0x0, {0x0, r6}}, 0xd4}}, 0x0) 12:36:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r2, 0x1000000200200103) keyctl$revoke(0x3, r2) [ 862.926041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 12:36:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 863.110171] protocol 88fb is buggy, dev hsr_slave_0 [ 863.115465] protocol 88fb is buggy, dev hsr_slave_1 [ 863.178603] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 863.276962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22938 comm=syz-executor.0 [ 863.289913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 863.446088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22944 comm=syz-executor.1 [ 863.458956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 12:36:39 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x440, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040)) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0) ftruncate(r3, 0x10099b7) connect$unix(r2, &(0x7f0000000400)=@file={0x1, './bus\x00'}, 0x6e) 12:36:39 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0) 12:36:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c8"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:39 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x11, 0x507, 0x0, 0x0, {0x0, r6}}, 0xd4}}, 0x0) 12:36:39 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getown(r38, 0x9) 12:36:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:40 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 866.044555] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 866.055344] kauditd_printk_skb: 118 callbacks suppressed [ 866.055353] audit: type=1800 audit(1569846999.992:14272): pid=22965 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="bus" dev="sda1" ino=16939 res=0 12:36:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 866.139275] audit: type=1400 audit(1569847000.022:14273): avc: denied { map } for pid=22954 comm="syz-executor.2" path=2F6D656D66643A2F6465762F6E65742F74756E202864656C6574656429 dev="tmpfs" ino=86423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:36:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 866.281413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22977 comm=syz-executor.1 [ 866.283456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 866.304908] audit: type=1400 audit(1569847000.202:14274): avc: denied { map } for pid=22973 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:40 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip_vti0\x00') r1 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@sco, &(0x7f0000000100)=0x80, 0x800) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10001, 0x6, 0x4, 0x40, 0xffff, 0x20, 0x10000}, 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "86d889b573dcf78a", "dbec04dfe7dc036eabe2b1bf05d6d5a167301ba185b56ecefe20990a2a0b7919", "a5149622", "b837d7f193eae27f"}, 0x38) exit(0x80000000) r3 = accept(r1, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4001000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff81}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xee09}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x8001) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000440), 0x4) r6 = socket$packet(0x11, 0x2, 0x300) flistxattr(r6, &(0x7f0000000480)=""/250, 0xfa) r7 = open(&(0x7f0000000580)='./file0\x00', 0x400000, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f00000005c0)=0x93, 0x4) write$P9_RRENAMEAT(r5, &(0x7f0000000600)={0x7, 0x4b, 0x1}, 0x7) r8 = accept(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000006c0)=0x80) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r9, 0x6, 0x21, &(0x7f0000000700)="373418c6a3906a36a6146768ce5775a8", 0x10) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000740)={0x0}, &(0x7f0000000780)=0xc) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f00000007c0)=r10) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000800)='/dev/hwrng\x00', 0x0, 0x0) accept4$inet(r11, &(0x7f0000000840)={0x2, 0x0, @dev}, &(0x7f0000000880)=0x10, 0x800) r12 = creat(&(0x7f00000008c0)='./file0\x00', 0xfa) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000940)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r12, 0x8916, &(0x7f0000000980)={@empty, 0x7d, r13}) lgetxattr(&(0x7f00000009c0)='./file1\x00', &(0x7f0000000a00)=@random={'osx.', 'mime_typewlan0#$\x00'}, &(0x7f0000000a40)=""/132, 0x84) socket$nl_generic(0x10, 0x3, 0x10) r14 = accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14, 0x800) getsockopt$SO_TIMESTAMPING(r14, 0x1, 0x25, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) 12:36:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 866.409726] audit: type=1400 audit(1569847000.212:14275): avc: denied { map } for pid=22973 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.555436] audit: type=1400 audit(1569847000.242:14276): avc: denied { map } for pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.670391] audit: type=1400 audit(1569847000.272:14277): avc: denied { map } for pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.756733] audit: type=1400 audit(1569847000.292:14278): avc: denied { map } for pid=22979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.790131] net_ratelimit: 18 callbacks suppressed [ 866.790137] protocol 88fb is buggy, dev hsr_slave_0 12:36:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x9) 12:36:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 866.795805] audit: type=1400 audit(1569847000.292:14279): avc: denied { map } for pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.800246] protocol 88fb is buggy, dev hsr_slave_1 [ 866.830295] protocol 88fb is buggy, dev hsr_slave_0 [ 866.835414] protocol 88fb is buggy, dev hsr_slave_1 [ 866.934459] audit: type=1400 audit(1569847000.292:14280): avc: denied { map } for pid=22973 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.066311] audit: type=1400 audit(1569847000.302:14281): avc: denied { map } for pid=22979 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.270144] protocol 88fb is buggy, dev hsr_slave_0 [ 867.275710] protocol 88fb is buggy, dev hsr_slave_1 [ 867.590158] protocol 88fb is buggy, dev hsr_slave_0 [ 867.595555] protocol 88fb is buggy, dev hsr_slave_1 [ 867.830212] protocol 88fb is buggy, dev hsr_slave_0 [ 867.835556] protocol 88fb is buggy, dev hsr_slave_1 12:36:42 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r38, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:36:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:42 executing program 0: gettid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) getpgrp(0x0) r3 = gettid() r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) kcmp(r5, r3, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:36:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 12:36:42 executing program 1: 12:36:43 executing program 1: 12:36:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:43 executing program 2: 12:36:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:43 executing program 1: [ 871.990187] net_ratelimit: 22 callbacks suppressed [ 871.990193] protocol 88fb is buggy, dev hsr_slave_0 [ 872.000280] protocol 88fb is buggy, dev hsr_slave_1 12:36:46 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)) 12:36:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:46 executing program 0: 12:36:46 executing program 2: 12:36:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000000000ba0080080002007f196be0", 0x24) 12:36:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 872.080192] protocol 88fb is buggy, dev hsr_slave_0 [ 872.085314] protocol 88fb is buggy, dev hsr_slave_1 12:36:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth0_to_bridge\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='&']}) 12:36:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89ef, &(0x7f0000000380)="5dccffce36d3cb9d59f828626e044e2d43e75ea5d977b3e2ff1b89a9c62d293df0560e08d4090cf93d7a9868bed5dbb32920d777202bb9435530552e281d547db118b4f45e70199f905d0831f101a23b417bb01c5d5ac1db935ba1ebb69898dfd83d4bb782afde748da8300bc66d3854947bb9ebbcabea1e9988843139ac9360a93c") bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)=""/189, &(0x7f0000000140)=0xbd) r1 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@caif=@rfm, &(0x7f0000000300)=0x80, 0x3fbf338f3ade361b) r2 = socket(0x80000000000000a, 0x0, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1a) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x12, &(0x7f0000005ec0), 0x58) r3 = accept$inet6(r2, 0x0, &(0x7f00000004c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000480), 0x1fffffffffffff73) r4 = accept4$unix(r1, &(0x7f0000000440), &(0x7f0000000340)=0x6e, 0x80000) r5 = gettid() pipe(&(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r5, r6, 0x0, 0x0, 0x0}, 0x30) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, 0x0, &(0x7f0000000600)) r8 = socket(0x400000010, 0x802, 0x0) write(r8, &(0x7f0000000380)="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", 0x166) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000002700)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000e00)=0xffffffffffffff1c) r9 = getgid() r10 = getgid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000018c0)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="000000000000000000000000ff00000000000000000000000000000000000000000000000000000000e5ffffffffffffff000000000000000000000000000000000000000000000000d5ffce76f8"], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000700000001040000020000003c37000008000000008000000000000000000000060000000400000000000000628d000006000000ff070000090000000d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00050010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038006f776e657200"/462, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB], 0x8) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000640)={r5}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x0, 0x0) sendto$inet6(r11, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 12:36:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'nr0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 872.273984] kauditd_printk_skb: 108 callbacks suppressed [ 872.273993] audit: type=1400 audit(1569847006.212:14390): avc: denied { map } for pid=23046 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=86546 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 872.447426] audit: type=1400 audit(1569847006.262:14391): avc: denied { map } for pid=23049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:46 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 872.634999] audit: type=1400 audit(1569847006.302:14392): avc: denied { map } for pid=23049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.674448] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 872.773656] audit: type=1400 audit(1569847006.312:14393): avc: denied { map } for pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.911252] audit: type=1400 audit(1569847006.312:14394): avc: denied { map } for pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 873.030175] protocol 88fb is buggy, dev hsr_slave_0 [ 873.035319] protocol 88fb is buggy, dev hsr_slave_1 [ 873.040489] protocol 88fb is buggy, dev hsr_slave_0 [ 873.045586] protocol 88fb is buggy, dev hsr_slave_1 [ 873.063144] audit: type=1400 audit(1569847006.332:14395): avc: denied { map } for pid=23049 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 873.165920] audit: type=1400 audit(1569847006.352:14396): avc: denied { map } for pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 873.232775] audit: type=1400 audit(1569847006.362:14397): avc: denied { map } for pid=23049 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 873.260011] audit: type=1400 audit(1569847006.392:14398): avc: denied { map } for pid=23051 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 873.269482] audit: audit_backlog=65 > audit_backlog_limit=64 [ 873.510140] protocol 88fb is buggy, dev hsr_slave_0 [ 873.515333] protocol 88fb is buggy, dev hsr_slave_1 12:36:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:49 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 12:36:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000028c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_retopts={{0x20, 0x0, 0x7, {[@rr={0x7, 0xf, 0x9, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1]}]}}}], 0x20}}], 0x1, 0x0) 12:36:49 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) pipe(&(0x7f0000000440)) 12:36:49 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)=0xfff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000800)=@raw={'raw\x00', 0x9, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0xf0, 0xf0, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [0xffffffff], 'veth1_to_hsr\x00', 'veth1\x00', {}, {0x1fe}}, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'rose0\x00', 'team_slave_1\x00'}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 12:36:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x3, 0x4182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) 12:36:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ptrace$setregset(0x1b, r3, 0x20000004, 0x0) 12:36:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 875.663893] ptrace attach of "/root/syz-executor.0"[6984] was attempted by "/root/syz-executor.0"[23107] 12:36:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 875.836681] EXT4-fs (loop1): inodes count not valid: 4142989440 vs 128 [ 875.858422] ptrace attach of "/root/syz-executor.0"[6984] was attempted by "/root/syz-executor.0"[23113] 12:36:49 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x14) getsockname(r0, &(0x7f0000000300)=@generic, &(0x7f0000000280)=0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d51e56e3d430303030303030303030303030303030303030302c6f626a5f747970653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d6e657430"]) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r4, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a1dd6e15e4ba5") r5 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r6 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, r6, 0x0) r7 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) getsockname(r6, &(0x7f00000004c0)=@ethernet={0x0, @random}, &(0x7f0000000400)=0x80) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000001900)) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0x0, 0x0) getsockname$inet6(r5, &(0x7f0000000580)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000800)=0x1c) 12:36:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getgroups(0x0, 0x0) ioctl$KVM_SET_FPU(r2, 0x4010aefd, &(0x7f0000000200)) 12:36:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x4018aefa, 0x0) [ 877.146460] [ 877.148128] ====================================================== [ 877.154540] WARNING: possible circular locking dependency detected [ 877.160866] 4.14.146 #0 Not tainted [ 877.164489] ------------------------------------------------------ [ 877.170806] syz-executor.0/23126 is trying to acquire lock: [ 877.177251] (&rp->fetch_lock){+.+.}, at: [] mon_bin_vma_fault+0x6f/0x280 [ 877.187251] [ 877.187251] but task is already holding lock: [ 877.193405] (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 [ 877.204313] [ 877.204313] which lock already depends on the new lock. [ 877.204313] [ 877.213064] [ 877.213064] the existing dependency chain (in reverse order) is: [ 877.220773] [ 877.220773] -> #1 (&mm->mmap_sem){++++}: [ 877.226331] lock_acquire+0x16f/0x430 [ 877.230669] __might_fault+0x143/0x1d0 [ 877.235082] mon_bin_fetch+0x212/0x2e0 [ 877.239511] mon_bin_ioctl+0x1c5/0xb50 [ 877.243926] do_vfs_ioctl+0x7ae/0x1060 [ 877.248684] SyS_ioctl+0x8f/0xc0 [ 877.252578] do_syscall_64+0x1e8/0x640 [ 877.256999] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 877.262706] [ 877.262706] -> #0 (&rp->fetch_lock){+.+.}: [ 877.263201] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 877.268460] __lock_acquire+0x2cb3/0x4620 [ 877.268467] lock_acquire+0x16f/0x430 [ 877.268474] __mutex_lock+0xe8/0x1470 [ 877.268480] mutex_lock_nested+0x16/0x20 [ 877.268487] mon_bin_vma_fault+0x6f/0x280 [ 877.268500] __do_fault+0x104/0x390 [ 877.296509] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 877.298131] __handle_mm_fault+0xde1/0x3470 [ 877.298139] handle_mm_fault+0x293/0x7c0 [ 877.298146] __get_user_pages+0x465/0x1220 [ 877.298157] populate_vma_page_range+0x18e/0x230 [ 877.314930] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 877.316253] __mm_populate+0x198/0x2c0 [ 877.323129] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 877.325840] vm_mmap_pgoff+0x1be/0x1d0 [ 877.325848] SyS_mmap_pgoff+0x3ca/0x520 [ 877.325855] SyS_mmap+0x16/0x20 [ 877.325867] do_syscall_64+0x1e8/0x640 [ 877.349256] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 877.350979] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 877.350982] [ 877.350982] other info that might help us debug this: [ 877.350982] [ 877.350984] Possible unsafe locking scenario: [ 877.350984] [ 877.350985] CPU0 CPU1 [ 877.350987] ---- ---- [ 877.350988] lock(&mm->mmap_sem); [ 877.350994] lock(&rp->fetch_lock); [ 877.351004] lock( [ 877.357683] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 877.360420] &mm->mmap_sem); [ 877.360424] lock(&rp->fetch_lock); [ 877.360431] [ 877.360431] *** DEADLOCK *** [ 877.360431] [ 877.360437] 1 lock held by syz-executor.0/23126: [ 877.360438] #0: (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 [ 877.360459] [ 877.360459] stack backtrace: [ 877.360472] CPU: 1 PID: 23126 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 877.385164] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 877.391701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.391705] Call Trace: [ 877.391719] dump_stack+0x138/0x197 [ 877.391728] ? vprintk_func+0x65/0x159 [ 877.391738] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 877.391750] __lock_acquire+0x2cb3/0x4620 [ 877.398170] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 877.402903] ? trace_hardirqs_on_caller+0x400/0x590 [ 877.402915] ? trace_hardirqs_on+0x10/0x10 [ 877.402923] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 877.402933] ? kmem_cache_alloc+0x12e/0x780 [ 877.402948] lock_acquire+0x16f/0x430 [ 877.428121] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 877.431385] ? mon_bin_vma_fault+0x6f/0x280 [ 877.431394] ? mon_bin_vma_fault+0x6f/0x280 [ 877.431403] __mutex_lock+0xe8/0x1470 [ 877.431408] ? mon_bin_vma_fault+0x6f/0x280 [ 877.431421] ? save_trace+0x290/0x290 [ 877.452388] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 877.459183] ? mon_bin_vma_fault+0x6f/0x280 [ 877.459199] ? mutex_trylock+0x1c0/0x1c0 [ 877.487796] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env [ 877.489529] ? ptlock_alloc+0x20/0x70 [ 877.503558] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 877.506712] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 877.523444] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 877.525187] ? rcu_read_lock_sched_held+0x110/0x130 [ 877.525200] ? kmem_cache_alloc+0x611/0x780 [ 877.542194] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 877.548021] ? __lockdep_init_map+0x10c/0x570 [ 877.548034] mutex_lock_nested+0x16/0x20 [ 877.646337] ? mutex_lock_nested+0x16/0x20 [ 877.650582] mon_bin_vma_fault+0x6f/0x280 [ 877.654997] __do_fault+0x104/0x390 [ 877.658610] __handle_mm_fault+0xde1/0x3470 [ 877.662922] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 877.667863] ? find_held_lock+0x35/0x130 [ 877.671904] ? handle_mm_fault+0x1b6/0x7c0 [ 877.676126] handle_mm_fault+0x293/0x7c0 [ 877.680170] __get_user_pages+0x465/0x1220 [ 877.684387] ? follow_page_mask+0x1560/0x1560 [ 877.689121] ? memset+0x32/0x40 [ 877.692390] populate_vma_page_range+0x18e/0x230 [ 877.698437] __mm_populate+0x198/0x2c0 [ 877.702306] ? populate_vma_page_range+0x230/0x230 [ 877.707219] vm_mmap_pgoff+0x1be/0x1d0 [ 877.711090] ? vma_is_stack_for_current+0xa0/0xa0 [ 877.715917] ? __fget+0x237/0x370 [ 877.719351] SyS_mmap_pgoff+0x3ca/0x520 [ 877.723567] ? find_mergeable_anon_vma+0x2c0/0x2c0 [ 877.728574] ? do_syscall_64+0x53/0x640 [ 877.732569] ? align_vdso_addr+0x60/0x60 [ 877.736626] SyS_mmap+0x16/0x20 [ 877.739998] do_syscall_64+0x1e8/0x640 [ 877.744360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 877.749197] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 877.754540] RIP: 0033:0x459a29 [ 877.757718] RSP: 002b:00007f571a8bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 877.766629] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a29 [ 877.774507] RDX: 0000000001000002 RSI: 0000000000400300 RDI: 0000000020a05000 [ 877.782208] RBP: 000000000075bfc8 R08: 0000000000000009 R09: 0000000000000000 [ 877.789828] R10: 0000000000008012 R11: 0000000000000246 R12: 00007f571a8bc6d4 [ 877.797077] R13: 00000000004c5f27 R14: 00000000004dabb8 R15: 00000000ffffffff [ 877.804508] net_ratelimit: 18 callbacks suppressed [ 877.804511] protocol 88fb is buggy, dev hsr_slave_0 [ 877.810214] protocol 88fb is buggy, dev hsr_slave_0 [ 877.814629] protocol 88fb is buggy, dev hsr_slave_1 [ 877.819695] protocol 88fb is buggy, dev hsr_slave_1 [ 877.824745] protocol 88fb is buggy, dev hsr_slave_0 [ 877.834793] protocol 88fb is buggy, dev hsr_slave_1 [ 877.851474] kauditd_printk_skb: 161 callbacks suppressed [ 877.851481] audit: type=1400 audit(1569847011.792:14549): avc: denied { map } for pid=23123 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.970893] audit: type=1400 audit(1569847011.802:14550): avc: denied { map } for pid=23130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.993286] protocol 88fb is buggy, dev hsr_slave_0 [ 877.993349] protocol 88fb is buggy, dev hsr_slave_1 [ 878.019000] audit: type=1400 audit(1569847011.802:14551): avc: denied { map } for pid=23130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.044335] audit: type=1400 audit(1569847011.812:14552): avc: denied { map } for pid=23130 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.083482] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 878.098807] audit: type=1400 audit(1569847011.822:14553): avc: denied { map } for pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.109070] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 878.129991] audit: type=1400 audit(1569847011.822:14554): avc: denied { map } for pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.154656] kobject: 'kvm' (ffff888219fbcd90): kobject_uevent_env [ 878.161092] audit: type=1400 audit(1569847011.822:14555): avc: denied { map } for pid=23134 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.188216] kobject: 'kvm' (ffff888219fbcd90): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 878.191090] audit: type=1400 audit(1569847011.832:14556): avc: denied { map } for pid=23134 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.225390] audit: type=1400 audit(1569847011.832:14557): avc: denied { map } for pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.249566] protocol 88fb is buggy, dev hsr_slave_0 [ 878.249603] protocol 88fb is buggy, dev hsr_slave_1 12:36:52 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r34}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r35}, {}], {}, [{0x8, 0x7, r36}, {}, {0x8, 0x4, r37}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) 12:36:52 executing program 1: 12:36:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:52 executing program 2: [ 878.264921] audit: type=1400 audit(1569847011.832:14558): avc: denied { map } for pid=23130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:36:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:52 executing program 0: [ 878.309347] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env [ 878.333620] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0' 12:36:52 executing program 2: 12:36:52 executing program 1: 12:36:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 878.444629] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env 12:36:52 executing program 0: [ 878.485792] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 878.529622] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 878.570338] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 878.630882] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env [ 878.637369] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 878.650503] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env [ 878.656977] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0' 12:36:55 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), 0x0) 12:36:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:55 executing program 2: 12:36:55 executing program 0: 12:36:55 executing program 1: 12:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:55 executing program 0: 12:36:55 executing program 1: 12:36:55 executing program 2: 12:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 881.419208] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env 12:36:55 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nobarrier='nobarrier'}]}) 12:36:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000806a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d66"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 881.464939] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 881.485189] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env [ 881.519964] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 881.559714] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 881.567147] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.581159] hfsplus: unable to find HFS+ superblock [ 881.595629] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 881.604827] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.620116] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 881.627799] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.628730] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env [ 881.647780] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 881.657780] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 881.659627] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env [ 881.666552] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.671372] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 881.689274] hfsplus: unable to find HFS+ superblock [ 881.699231] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env [ 881.706087] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 881.741328] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 881.747888] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.810556] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 881.825576] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 883.990118] net_ratelimit: 26 callbacks suppressed [ 883.990123] protocol 88fb is buggy, dev hsr_slave_0 [ 883.990126] protocol 88fb is buggy, dev hsr_slave_0 [ 883.990180] protocol 88fb is buggy, dev hsr_slave_1 [ 883.995145] protocol 88fb is buggy, dev hsr_slave_1 [ 884.070171] protocol 88fb is buggy, dev hsr_slave_0 [ 884.075279] protocol 88fb is buggy, dev hsr_slave_1 [ 884.230119] protocol 88fb is buggy, dev hsr_slave_0 [ 884.235201] protocol 88fb is buggy, dev hsr_slave_1 12:36:58 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0xffffffffffffff0d}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) inotify_init1(0x81800) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x3c, 0x222000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000400)) r7 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r9}, {}], {}, [{0x8, 0x7, r10}, {}, {0x8, 0x4, r11}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r12 = gettid() tkill(r12, 0x1000000000016) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r13, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x1ff], 0x1, 0x0, 0xfffffffffffffffe, 0x6000000000, 0xfffffffffffffffa, 0x5, {0x6, 0x2, 0x8, 0x5, 0x5, 0x0, 0x1, 0x7, 0xf04d, 0x400, 0x3, 0xfff, 0x5e09, 0x461, "de3905337f772d7524896395a274525851fddee480a50316465e7ce674a1267a"}}) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) fsetxattr$security_capability(r14, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x62}, {0x1, 0x9}], r15}, 0x18, 0x3) r16 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000000400)) r17 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r18}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r19}, {}], {}, [{0x8, 0x7, r20}, {}, {0x8, 0x4, r21}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000600)) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r23, 0x40045431, &(0x7f0000000600)) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000600)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r25, &(0x7f0000000340), 0x41395527) getpid() r26 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r26, 0x800454e1, &(0x7f0000000400)) r27 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r27, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r26, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6, r28}, {0x2, 0x5}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7, r29}, {}], {}, [{0x8, 0x7, r30}, {}, {0x8, 0x4, r31}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ashmem\x00', 0x8000, 0x0) getpid() getuid() r32 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r32, 0x800454e1, &(0x7f0000000400)) r33 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast1}}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 12:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:58 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@session={'session'}}]}) 12:36:58 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x0, 0x7}) 12:36:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="1c0000001a009b8a14e5f4070009042401000000ff00000000000000", 0x1c) recvmmsg(r1, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r2, 0x0, 0x80000003) socket(0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040)) 12:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 884.434723] kauditd_printk_skb: 100 callbacks suppressed [ 884.434732] audit: type=1804 audit(1569847018.372:14659): pid=23202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir902650667/syzkaller.LiQj26/628/bus" dev="sda1" ino=17042 res=1 [ 884.470256] protocol 88fb is buggy, dev hsr_slave_0 [ 884.475535] protocol 88fb is buggy, dev hsr_slave_1 12:36:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 12:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 884.475998] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env [ 884.492010] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 884.498881] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env [ 884.504104] hfsplus: invalid session number or type of track [ 884.515728] hfsplus: unable to find HFS+ superblock [ 884.516413] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 884.580332] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env [ 884.587617] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 884.592261] audit: type=1400 audit(1569847018.382:14660): avc: denied { map } for pid=23200 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=85928 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:36:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 884.689635] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env [ 884.712098] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env [ 884.718575] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4' 12:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x21, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee33467a7274340ae0c65b0e224d0f712c3ccbdef8e6a7908ea11e11fcc36b6b08b7c7f9acc5b231bfabfa6366031760737e13a6dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027a4585783ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bdceefc616d6654b423a1b8352d8f58978a9e67a28c9f17efebdbebf1f90a96d9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5de, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 884.722162] audit: type=1400 audit(1569847018.462:14661): avc: denied { map } for pid=23211 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 884.730552] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' 12:36:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="1c0000001a009b8a14e5f4070009042401000000ff00000000000000", 0x1c) recvmmsg(r1, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r2, 0x0, 0x80000003) socket(0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040)) [ 884.833739] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 884.856346] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 884.863061] audit: type=1400 audit(1569847018.542:14663): avc: denied { map } for pid=23214 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 884.958602] kobject: 'loop0' (ffff888098ffd5a0): kobject_uevent_env [ 884.960203] kobject: 'loop2' (ffff8880a49a69a0): kobject_uevent_env [ 884.979234] kobject: 'loop2' (ffff8880a49a69a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 884.996416] audit: type=1400 audit(1569847018.502:14662): avc: denied { map } for pid=23213 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.012992] kobject: 'loop0' (ffff888098ffd5a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 885.046957] audit: type=1400 audit(1569847018.542:14664): avc: denied { map } for pid=23213 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.073102] audit: type=1400 audit(1569847018.552:14665): avc: denied { map } for pid=23214 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.083643] kobject: 'loop4' (ffff8880a4a39320): kobject_uevent_env [ 885.114209] audit: type=1400 audit(1569847018.582:14666): avc: denied { map } for pid=23218 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.133365] kobject: 'loop4' (ffff8880a4a39320): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 885.153685] audit: type=1400 audit(1569847018.592:14667): avc: denied { map } for pid=23218 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.166027] kobject: 'loop1' (ffff8880a494e920): kobject_uevent_env [ 885.192783] kobject: 'loop1' (ffff8880a494e920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 885.217289] audit: type=1400 audit(1569847018.592:14668): avc: denied { map } for pid=23218 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1