8e6c83bad432390bd882b13c4f46172a0727011a5d25f1421f50fc43f32fbbd7b8a39d117ed22a1caa541a09106c13936b9a0bf1e62a62ff9268727f181098f2a478dbac2a4174988b3db46c871bb6dba3ac078906ba19755024fea65af321546113162d16f437a08a591c9606a9d450b4d89f37e2bf2824d114ab50e49fc3ef52c51999c07bd17c705402cddfff46a6f31acedd317472f8ce8de6a3c4a0d9a5ddd70a2e29372fb1ae3a1610bd8ac7999852d387809bf1c0481386919ce891fdbef6fa10973506d037aaa90506a72f877682e27543115117e2c062961601630a335595b6770f82f986bc2ce1c1bdf95f47cc4f7b2d083b6a06c9fd61f101f7fcfac84da7f909bc7fbfc94e0a6eca1809992ad28e7af6631b9c51b291f3f9faabd997927705e6f90138dfa12f3c8f2d45846564283f013c8052c9ddc24458fc31ccb80e589b9fdb65e614daa5fc86f73b3eea40dbeddc7e7532cc49ebdba762e3004dad98e699fd5f0d634b0de465b7de4b60241a6423845d831702299f746356727d9f951e9a8b96f306dd2b654542757e20746e80fc8bc398d79ea111e4f9a664fef92ace87a7e081ffd927782a7ee33a73e7d282ef964b85c6d9b3900365e9ecc45355d0ad0ac082b53edce3d1838620a61851f90d78629f6e69221fd166da3f275ac3df834559e92c944ede64a0376d8e7e578982f5fa60537fbc2d39cdc3151aed87436c583ba914c6bf56fb9db30eb18bcdadeb6fca6c93d8a58cb88a37a679e40d5f8de77b4781600045fd51024c9c1e79cbe7f28909317d59449f58da71b09eed0277339ba310443045bc883e48e452e4fd1ffd5815aac5f6a3e39f8597b295250e26d856f7f3f89921f2c17a1a0157faced7ec0cb009b73e2d903d6071e87192ec8e403eb1ad102285b307dee08e6f75bf819a1e0f7585f53bfe37f6fe49cc9ebff59507015d4425ccd8c0ad426c780fd4d80d08157096342a998ee0064090fed6ba901094925ce05d64642ab28bfc3604f8c1ebd53e16137ca7c0d65b3a3fe8cdda89f8c6a23c3921668869f4fe049c38428c03e7dfc058ffb81a7e0e67bc978eb944943476742d46e4c36625f8a27e23353c905f2fb66397e8e94cba08d222f2b4bb976515a8df4cac4ff0ba98ff371eb0a5da4baa177611a9078467d24295794ed1894536234f074deea096c12bbbe54dd13a55907235323da982f6869c4beea99fbd1163b534c0bbfd38a06a41001b713274a8ba85ec932c9e9b01ac785de1c7e914ec5128e3cd5ad5c1d5d600b0a4290ea2f89f7f547b81f4d486fee6fb159ae78032ea2b827c333966d13f25aa6b2e6ad7c34b392fcd2fcbc0eaf0056e99c2371a6b508e8aa9d267ca403a5af5226b182337a6cbfc64c0cae69842111ad0809fb4e2b2597b58cf2d4f06cf98b0e549ae22d055535e2e1b0ced58fe28c313e0330e03b0f738837eab44f1e64a3f8724f4ca5b0e3a1430acdeb02a794e731b2e05bf458e0c9a351b7f19f2c25adb307b275b05de47b8b0b3867f28155cdeca640a9f06dff8f5eab1d06502d639dc186f4931ecb4e25078d50103cb84486f183d898a4f1c4fd930cff0b83482444a275e740c50ea0931ed4ae393b28467908e02ec89f608cacbe9e42edb3720164435e440e25659aa7d731635477264b31337d7b4a1b33ccfb51103b03dc8d9d3d41b12e30d2b08d0cf661bb8c129765423c1438562cbcbd46b129e99d5d242fac43675dee714129ebc1ad732e9b2c1cd47736299c9c047c951af6c9fbb6507c7c09c6a9e9f3a78b7957990b61b98d35e58b67a50af70248b1026fec85f59d0fdfd9b20e8488ea9e511d2126ea19582e510fa1745995cb7fe878894d7913c26bf436bdd09daed6ba1894205f1ca4422bb28a5ba63edfd4217691f491d8b7d2ca195114677f26ed738f8adf52feedccf6dc8855cf37db860d229454c3b370c6df26b9454cdd8a9f57fd7b22a1caac116a536fee2e5e911f9c955ee3d4bae2ca1cb864133ed38241d8edc74e16896bd89b59f83176d86188998b1bb61c6dc189e20a85109121a32357201f2ca86a6b45515c28daadff460d03d917b5344592b6a867fa503b82e2d51b86797b139ab724aa0dc8c1f9abb384cf65c06f0a908bfb3727170820582594fac44d3944116aa4c02ed6b83ead17955fb23c8b307975abe8dc977215213faa944583ff2cfb34f5f3f97bfd24b53991d248ef439ecbedbe088077c024a7d4028a45348437b7fe34d318fd40b91fc9d46e70a486f450899ece3906253dd3443409045842c26668995ffc58544547ba3660fbc67493a21c5170ee4ed8a275e8be27512d6240c65b05ae11d99aa041366b69fb4f331341f7d1be1e5a2163dfbc759b27a0974ac73b3897085ea5bc2e4082d03698e45567b6ce755ddfedc495a3b0ada1186cc658250510d48d5ea935126720ea2c1e382cb29089f4d10f1a720ee7a122aec6ef6f6ed930b1482918dbe26e82d925bc68c60cb988ed6c0cd01e114e2ba69723c481b7d72d6aa493523c8bf28f4cd5883c219f08e101df05e8115da5a15614f8174310dbee25f0d0c942defdf1456e6d9c891f63a13761d9eb95f6637c93f6627139f70a9380b6a15dc0ab5097a43cfe80ee077bb1dcdea629adc6544dc50aafe8aeddbf835aa1ab2f35d68ce50c7344c8b704787839ae66d9ce3159887e1dec5facfa4aa37f90c232384067a7a0da7adb5388c6fae5cfa9374f18f183fd1caf4fb8832283497a016042b3ddeb2d1b316f01990551e91dc524e21bb4115b15ebe24234acaafdb2af24a01bb1d341f6dc1f371f052cca19da3c34d56a659c0dcee8e43d1de3f9e2006eac92aa7c00058281d13a8b9295c486fc9b1cba5b49283c45d49ea812811fe3e532a6aada465cb390850b99e1b37b35b4f660e212ae797df2a866f0640adb8d042f1f617fb90b493eaaf9b843e8752c52ab17f9846ac0820854adc9716af95a849f19c6c83c0200f3fd352f31aa88d7f98354a615e4de810fea92c7a988941d53414226078a503a295e59c59b1bcdb6cd6fe06ad1690b9f3ffdacf771f436d21c125f04a277c1bbb84d6b03ca1b40b469063acaaddc251231d9885cdff72589c901238661278410ffd856525b8a6eb8d5a577bce14370de98d89af901aa3d630ddf187cafd8d0a98dff94a49bf8d655250d5f430300a336a27b3cce170564b91c739f3e66b5cf210fe0b6fc3b3e1b45df2a222ed21c974f49bc0ad294f13b80b53c1eedf1f32e7da4fba21405f26ee47889e3534cf3b2230cb68a1b6d6f11246bc75e81cd3fccb1aaa538f0e53619f6ff1217c0832d80fab9ac842a698b128e07351999d2a9262949150d36b7dd77ca7895ed456d5f60c782aad56299d63ddb148575e4f3ea6d1ba2aef274c8898d7d2eb1e7e47c1b82687d393948ea8ceb96f8ab6cd1b040d7a7285e614e2fd2cd21681375db9898da32f4af57ff8381bc9e751556d16fe9daa50039553939bd9d4f368f56714c6bd76dbedd98daadfd369eedab325dc9548838969c501332b01016313f39a0faccc52f56884938242cbb088d667506e3dd7b7f892b4236b4e6af9c083464223c82641fd993023a45b63f7c8893070e5bee4e0751e3c25cbbb2b65f62d1f02f4806df11c0d8a84d12b8a19384933bb69542cfd25a2cbbb7e686494d594032c31ddb0eb596e8c21ce9c73687a292bd93c188b001ccf33816bf2d120e2924ef75e3fbe56bfde8bd20b8d6c15cfd1e40c88cca13f14c8d44b715150bf2d174", 0x1000) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) getpgrp(r0) 20:30:01 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x80000000016, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$UI_DEV_CREATE(r0, 0x5501) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "2c52c082d93e189b99cd3029de89aa0c59b621cabc6cb64e6aea8f9301fec1cddbf19179b65dfb9d"}, 0x2c) ioctl$TCSBRK(r1, 0x5409, 0x5) write$uinput_user_dev(r0, &(0x7f0000000ac0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1]}, 0x45c) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x7, 0x0, [], [{0x200, 0xe3, 0x5, 0x5, 0x2, 0x800}, {0x6, 0x941, 0x1, 0xffff, 0x3280, 0x474}], [[], [], [], [], [], [], []]}) 20:30:01 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="890704000c", 0x5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000280)={0x1000000efffffff, 0xe00000000000000, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="020d000510000000000000d30000000003000600252000000200046ac00200010000000001000000080012000200030000000000fa0000003000000002030000050000c6a8000000020000000008000092ab000000000001020014bb00200000ffffffde0000000003000500002000000200ebf2df0000210008000002000000"], 0x80}}, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x17, 0x0, 0x0) 20:30:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@hopopts={0x0, 0x2, [], [@hao={0xc9, 0x10, @rand_addr="e9df8b05808b98c56c34000c7ecbb923"}]}, 0xfffffffffffffff6) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="9effcc561c337c9da3f6c5dd34749be774f0896775b307af7b89e468152a0a2c8b5aa87ea207babdc257e6a2f1f6b19b1e72e6d6b5c5c75959917f9bc1ebeb2b48c16013ea9e90cc024542f30743db0acfeefc916c114750b5192d3fe11bb84a6c4b23bc2367d26616b036b663c02618c47d94bc0d6b56d234621ae9d5826974623342e59ae9eedeb5411516b5a3ab0eb0eda19b1efb67f1214f967719a0c365b68ce19be58025f1c7b6db05d3b7be82967bcbd4479e5c4dd365fc0e7f94d3337970ca7f1db16c20e3c6550dc939f1f7d21035a28bad2296ca9e3b44ad722384060cd3da5a4bc32c532ab405b5443505f1f5a91c50e0979a5907324eb73b47d411c7de2ab31492616fab468ed1a3f7cabb16bb5368895ead07c2651d1aedc5f169d5ca30d87884d55a029fdf2df642fad04cc57193e8cc056b570d053969d9bddfe1f2c4acb6743efeacd417f9ec29eb39647932c0590349f55fcfaddea61a89481fe66a3c65fd937f727a78d2af257014018c5fc45bc42cac0d3fd917e2d60eda02ba780b88e5260c794628c1b20651964cffef568caf993a4735db75ef63e27276b2396a4e61cf90601893aab13bf8fc0cd30f0933bb44b2fcd5b56d9ade90a0a922df5ae10a3f1e52165a3a5e95abdb2514bd6889a293ec78838998d5e4325f557957c54940e87bf826863c110c1b49126e62c4ef5ee904a14b9ec68012e7ded2516dbe5de1aabe5cc3b8c29a581f1b07b83bcb99a05a1cb95c2a9d6503755af5158b3168ca699eed46dadc85622dd403d72967a69bdda60badfa23bdfc35c85bd8508f25bb9df3e4019621871429b09ac0fcb5b832c4a98f3cd8e40502c8eb06bb96653df7a640ba3c0421798e8f79d2865b1e4315791d64da90a3dddcb1cbbd7f2e677f19878393b030d0c97ef480c1d86f3dd3e23eb88c150813addd4e13f75fe98de758b2df7c3a3c1f51f933d06e071e4bb19f16e9bda0faae63fba7441fc8f776db99d1f5e9b3397594b2a30e34652f4bb0b43fa2393bebdca3d3f8de1e0baea7566857d5028e382c44e4942001f197522c3a613712704026ff77c2a82aae54e2eae025a0dfa61f568503a963a9a7990b1aaab40fba6a424c96cdd290e587d5ec37b9842171c725648e5dd5868f98a13853ff9507da31f34cff096939a8dd32752bd2ef075b10633e58c2ed2a7178293126c014a42633b9d1685c26f08fc474104719a270ef1e0e7bdccfbedfa659241fc4eaff69a5d856f1e76af86443035fd3a219707cbd440886e5d7adfd902f1216348485de9198e999aa865dd673858426b211e0eb8ca30ef43d9917b28d29204390304e11ae2a18e33adb4252b6d9438449451f89643573a9d4d310a9d17f8d533b0745de34c3ca1c4ca28da5c8ac71b831d7c1b9e962fd9de2f56a44de0d623b57f0a39f0add04278f26560ad23a5ce6b3fccbc250a51bf261f874cf7b3ab7879d2f9322759514b93515a3528589017a1659c9062514a4a1e241a8f7a4a3ef5e8fcba5fda4fb60fb49c1bd2bffe65dea783b7a8e2e606d05581b537ba80aa221d414d69053f9d7e4513fa1bf7cde368612d07f7068def5532988772ea8ca8f0db1a1365ccc1abb747f5129b4f5328a8cea2e89edaf7fb4dc53143ffb3c6d6a056e7fbf7c29b767c5821a9f08d6e0be38d2d17869e027ba70aed337f7976f3a3d5976ba7028648813f605841d6d248f5d3b3771094db24c9271c95415d911f7879ac3628363f4d95086869ece2800e70c6cc28bd88f6593939a40224e7e37ea459a6f8f4dcef176ab7b300961a3c89a499409cf20d947fd5621c3f6c412f1860e85cae588634a547fed093d939872b192206f247cd5ae0aa86bd823d7b8b5d5b22f55fc034211f14875db20c602534b45c7e6a0a78bdc27a4dfdde1be1c97398a25da738dff6f876d7c1bc37e2afced8d", 0x565}], 0x1) 20:30:01 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1b"], 0x1) fallocate(r2, 0x0, 0x40000, 0xfff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8}) write$UHID_CREATE(r2, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) [ 230.912585] SELinux: failed to load policy 20:30:02 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) fcntl$getown(r0, 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101000, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000200)="9e294957596aa0068581740dc96a4dc456cf0aad7840983ae4c09b4cfd70719666b041ce0483c2d4612026eb44f2cfdae40d111b7be7728b5aface295eda58b15c980f97b0d9b063cf2f639092") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x27, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 20:30:02 executing program 5: r0 = dup(0xffffffffffffff9c) epoll_create1(0x80000) execveat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='veth1_to_hsr\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='veth1_to_hsr\x00', &(0x7f0000000380)='@ppp1posix_acl_access%,{\x00', &(0x7f00000003c0)='/selinux/policy\x00'], &(0x7f00000004c0)=[&(0x7f0000000440)='\x00', &(0x7f0000000500)='/selinux/policy\x00'], 0x1400) r1 = socket(0xf, 0x3, 0xa) r2 = add_key(&(0x7f0000000600)='big_key\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key(&(0x7f0000000680)='pkcs7_test\x00', &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000700)="2add8032817ebe5a11993c775ae748223a620eed0e7bb4ba3fcd219608cf8a11484c638e8f38707593b7ebf31310d615b4fbc718e34dc4203da86158cf1e44204f11a5ad618a1b5118e563d18d7380ce98f4b329c5b6728cf0c428765311b16a", 0x60, 0xfffffffffffffff8) r4 = add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0)={'syz', 0x1}, &(0x7f0000000800)="6e9fe0f857b5dffcbbde3f189b2d8291ee791f53bd546adb36077e78f34e6a4aecc1274b6d19de85770dc01fa60c5d6c1bf0c62521f6d150ee77a73d84e7ad0d8ebabdba1fbf5198a3d623fa6ae3c4000e0ffe5f2ad55723ee32a13aa618f20777f74439d947533405f54bc4c9816fe0055126ff635d39cdc20cdf121424b0fa8829e5847554ea", 0x87, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000008c0)={r2, r3, r4}, &(0x7f0000000900)=""/6, 0x6, &(0x7f0000000a40)={&(0x7f0000000940)={'wp512\x00'}, &(0x7f0000000980)="faa324e749e64016b945397a93829a8ce8dd807298b4338fdf5233f7897b5c23a45f4c4247fd5fdf47364bd978d5368c37846c010df4ab00e0c673e85adbd20168f00828f73ddf26d772b45c38e49c60f7443a9eec0a3539f0763bec71ab72d037b43292ffd11185526ee2c9c9e294e8d8d8e8a139d2882a0ebe672009b585bd664b731b3efcadaf3d898bd4dd3b92af67cd043e", 0x94}) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) recvfrom(r5, &(0x7f0000000040)=""/167, 0xa7, 0x12160, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x4, @remote, 'veth1_to_hsr\x00'}}, 0xfffffffffffffe7f) fcntl$getownex(r1, 0x10, &(0x7f0000000480)={0x0, 0x0}) r7 = geteuid() fstat(r5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000005c0)={r6, r7, r8}, 0xc) 20:30:02 executing program 2: r0 = socket(0x10, 0x20000000000003, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'gre0\x00', 0x1000}) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x81, 0x4) recvmmsg(r0, &(0x7f0000001cc0), 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000003080)=ANY=[@ANYBLOB="140000001e000103000001000002000000000000"], 0x1}}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x220400, 0x0) 20:30:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x208100, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) r2 = request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='cpusetem1\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1000000003, 0x10, r1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000180)="892db2674b0549ad4745d5c9f532", 0xe) socket$inet_tcp(0x2, 0x1, 0x0) 20:30:02 executing program 3: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004140)={'team0\x00', 0x0}) sendmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000000000)=@generic={0x3, "4d14819e48a8abf9f126082bd8b31914abd08a64964c471acadfdd161ef241c8d4e6cd219b4071a4404c3da16cf841aedade0762a0ced4b4236aed7889828f3834987ac037fcbd9c4f832f1d6e62bdce22af9e6350a24e0726e5f0301777645fd7fceddbc13e434cd2ccdc94738ce8591ff258bdc95ff8bd81242bdc1aef"}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="cce5fdf9b1c7bfe67fc306fb3226a087be83f728270b2480b8003e5df811d351c2e444178a59a93b884c6cc3b3db39b71437eef96cf6cf67f29b4eccc54b578b6013e55b89362959810c7088e271eb24", 0x50}], 0x1}, 0x5a8}, {{&(0x7f0000000240)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=[{0xc0, 0x84, 0x10000, "759b1efaa65088d7eaa784755986a67b94e42ccb00e18a9f7e4d167e537396e993d6974e9024074f53a164531e77cf13fc8fe67ea82b593db4c4172aba872290e8f92492cdd611acc93cbcbbf6510da6d403443e572f68b69dc57e9b25b0d54a75d3659777efd49dcc041a79a6e92403cdc3899cfa5c7916a4d2cc167c561d140f030ddf84d83af318bfbeaaba2254bb7080ef672721e506faa69b1d7e28e5b856eb7161d03e074a0781aeaf20c87c39"}], 0xc0}, 0x200}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000003c0)="db248f40a84de47a50a0ab50f0ce8975a7bae31b60ea31b0263bb95838341daf59bdc4a34cd0f241e5435c1d70943ad94d03acdb4bcc404059d565a286c57d04a897683db1df82715e97a684ff80edf0923c4bca4626a4b0a0046e453949fe99c59b", 0x62}, {&(0x7f0000000440)="2a17ae3d3172cff100be39dee7dfe373f351f6aa5415f9259053f49eda32f47f7f53267655bbdaf74bf1c223e0e108eba509fd48f9bde9d5fa246b8cf7cbe40d6b591c8b6cb107ff4571788c4cb9002228ed7a43477a3834194c354385", 0x5d}, {&(0x7f00000004c0)="bf055270e0299bb1e4437057c993bf810844bbb962df9c93e69373cd2410cc45f30f", 0x22}, {&(0x7f0000000500)="9ba63df764386d02570226b9a840837fdd6b9ba9cfb5d605b9ac51f2c4581eee6f934d8b133a35a70124b435363d9a43f8681950c646f7cbe5c0364f100eaf738b853d352dcf7719a3436653cb256886ca1aa168bc61e4728365db8a2938512d262787cadd085e51d3f1891ea2364c984ebabced795ae661a33e6695f369fcf890cf581ea487d0eff51a65cdb3fa1f2955fa1320caadd77c4490b6f6e60be46f5deea34f099197c03ce42646ef36036bf944d9eab91f6f5d9056a4099fb04d", 0xbf}, {&(0x7f00000005c0)="915a6f7df233725fc8393659fd160c305515c4c4eb23354cd7ba777d9e4b96cdda986d6aac1298c2ca083dad7dca1edd5fc90ffdf879597cb8a59a1192cb0fa8d950a28ac5dbcbe5cf893167570376396cbb928ae8424ccdd58c511f30571da970b623759efa098670da8ebfb49805136519a2909152bc1027c115ba15d4361128d8fa81694b86564026b6372f9479852cd953acf85cd1fa2fd8b49c646fd1d19b4f18dd2a61abfe", 0xa8}], 0x5, &(0x7f0000000700)=[{0xd0, 0x110, 0x4, "2cee927c3e6e98f3d7f7e83e8945632015c97c0328974519a4b550c80376cefe44949241ea580f993d7c46c68f4dfa18b084578f5cf73640e04912e3b42154b128fffeeec4a9b84dcdaaf0f9c4c7da4b5bbb28d67c48b940b4bc1609f18ff335198b8ccf89e0e8748b6fe5fd31134ea3accb06a94028b021d2b344bc5e2d8c0b45de0718421e2fb40239a41529508c33ded9824421c2a3e30a4fb4e5a3fdbb2e8190bfd85028a5bdd3090b757edd331fd6a2436ff5c2069567"}, {0x40, 0x11a, 0x9, "45752dffa0dd33b6f8a98af95925113d196b7dcf1df571caf7bc4bc8a67a18cb49504e52f7cb3ab77c9111"}, {0x48, 0x117, 0x8, "1c41db6c7b6b05eee2e30dfdf08b2bef0a2a9e08ff0bb162612d1246b174ab3237cf60028e4f8c5becfb89b25239a5f58c2f3b8dfe3045"}, {0x18, 0x108, 0x10000, "97e82f4cafde8b"}], 0x170}, 0x7fff}, {{&(0x7f0000000a80)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000000b00)="a5f29d3dda089ee06af91efcc0261ff05bbd9f273495902fa2e80b68be23cc82c32e5f3154331ffc7d7e00e26ffc906f30274ec172f1b4dbf84540137bad62f4f088128782a3d3e039608b43a21f420cee1a2a6c40a4e1fd786ae92f27987a942801348322aac9bebb928007a78373b3a1cae2b47d0f9a2c9e4a1a994611a3715fe7557bb7a5566d04a6720e1bfa03fb1d348406f8488e39ea4b229fe1a4e9ec6a7ed77f4ae0870f3e0422a29b43b51d3e3a08c72fc1076ee088db89d1f6a77352cad80971d58906b5676651dc3ea2e9e307d14952e2e7f0d933384729d9403632b006eaa2ea92287c6910db4b56a096782ff6a45ab6fbcf5aedf24b5f388a29022326b188566a880e8fe5f6955b58b650904aadd61784e4a7f946181571ab7780b8b4d66715dfa212560a5f1ae722cb7087d7177f22dd0ff64246db2ecab7b946ad6f070127adcae4e9d534489438efc47a68fafc0d12b9dd6b74d9e64eea48b52f43db8e125826bad798753b6c7782ad6b1f633725e36ed4e4e30c3a855cf5f8c38d8697885f4e124148d5c8c8a1624ab010fa388baf61e28384a62df19c476a12f78a9c5ff31f8aad070e07dc092017b0f3057eeabdbac636adac9bf568c75b57a586964cb77838d84427517770bf3f9c1a265b68a0c4bd31f978128b8e02e198e0e9806e23c25d559e3d360cbd4d34233b32daac1431317b75c13eac83b3dd2aa3a2d792865cd1e93d7fa64c3314db555ccca61586a5160cbf2b3dac4430b0e546c924f51f1ccdd645f5f7a0a595aa9a3fe45fd61c513cc0e833121ee312537ceeb71c653e41bcdd81689cdac9b248b21d21bc3a6c39390c80ecf86ca2dee162b743039aee7cb2fc673500063f4606555677701f42fa0ec53f579807ee3ab00d9d7497572161ecd4c75309cbf48d1c468500774b6357945254c4832bbc91eb5c37939d0c6be9c26dc626c570fd8b61947f382f7d5d6c8a73dc2fa6817132214c3316af48a9784d473e54300ea80a923e0c2395307955c352728b38f5e8d0a79417d2ccb2d5a56b304014731686ab36659fd9320fa80d0d80f47fe21ff827cc0ca2861261bc5235531e1104f4c9c1ede5f1d263de0067e5ad720e754dbf85deb45ecda1301c3b0d7d5e9c69e0962838812e99ab0be6f84f051d6ecf37d7d846b085e1cef1ff98ba4c9c338ab2b45c414921496e1735982fae28e0a02703cbd56e63a67827c37ac81f0315485023f36e2c0f8d5b887f9576f8147ca6ac7dc0ffba2cbe8c50c2555018255a3ebbd25ec288251c96746618a432b0f51ec0853a3a8c4d8727241648416a869d59bb1a810b535733a1b0c549543647ad75afb8b3bba5700d4a87a3174322e9189b1d031e9d41b06b3b93b67d5d315479d98c04a0ce1fc4a3abf57f8b970c283b53da583380b88f505d7b13b828f0d66e060f5df1bd2ef03b38262f32bb158efb5beb4010d8c0112071d01c8288e200b9066dbb2519936b871f1b5738402ad4c485e60cff22f8dbba3642f5da6d06f57127f7e277c0196baf08cece434ded43547a8c850bfb81e35f8ee2223014300edadf0d659186e5ecf9dbf47407816c2ecf2cd43bdf20323b0abbffcdda87884a40c28d81d3d8b5f533837aa44c6cbbee0c1c4c41275a3e9f8b95a9a1fe16394c377822cd26dbb13f4182d4b622f6259b4cd0e773cdec57ae0ac1945e4f55c1577e09fc9afce3c3975bcd902d7745bb6b48b4b4f6be09121de02c8d82b2dd8379821f8958b42b3ab547c25df4a25225845d45ce1921e6531f3bef0f4c14deecd0ab66106b4390b84b2d5cc965d626ef169cde039bbf863d661fb89692b9a69744357dcd1e615c0bd6c0691a496ac9c63630c8ae774d6325b601b898701a8bb2b50db96eb7b49439cba86c0ce7610aae1b6887aea219dd5ff29ebfb0dcdbc4426c257473b451179e08f5c14b345784324112cea9cf537778b850d7db5c59b4f47ba31cec5a19947f00dd3bd83ada57e525b32158b5b955064fa13f6a72f3518a2abe43f42588d8e0206d7d94425c4bb26cd6ea2d7e0f70fdfaad59b76de5d11e063c74d4b3493c50fd2732850f266e58d69fcf2def0829f250f2e34c25a370593812f43175f57935d1aa30efe2d3ca02ddb83df2e81b3c50574cbb287698d5031ba31eca0954ae34da475f05578d7e6589296781927796e8ebedde2112b90c6d9d8b4c97b75764f64ab1a75badd5db8fafe05381ebbba20c7612531f98a69c1d4010bdcd4f456d27c962f638240827b4ee09e711a2386c248a282480c41051e11d2178e59f6047cd9a2ac4eee297f1523dc811b4838d1128bf79c5decdbd3a84ec477f8acee8e6e300d76b2e149c8389b8018a29ec7c127039361f31b3a8e14d564dab03d076d2c0b6576f0daec0e094dea54ac9ff210abb40af50a0c4578c598d4ce450be05f55cf6d6a2cdbeef52ffee3310afb3d37b785bb926ff5f97afb999982d5000c7be1e26d46c8799925f5f66555e3659cf3318c06653d2edf80c173a56da0b19c4cc7c92da21714b6cbe7150eb8a9198f6ab5c3f9cdcbe55ac4fd6e49325017e753a2e43b97d0b99587478b651404256c06982d7773e290d8a595511cf69ac3517f65854387048c2ebcc207a85dfd6ee35998c62b872434c02f4f760551a535432f0b852e6f28956eb00677dfb2514a5259daded53c057a7882f3688bb952f16e098e8e828930f49978471b5b4f6f7d7310e9de5b870dc49a04f3896726f41dd80b5dd19a6420792bd57fcb6defb4e1cadd6c45e75084ce972024dba5219ff1a16bf12b101fa84f74889cd6c5cf5b3a3367dadaccdb1fe2673e3cea30b1f6ac948527b55969261d9b67cd46dbaf1e20a55ce0dc0653edf7aea1c891da94983be31b054863efa962e39ab78ee2483581a89c1c72aeb928e571d8bc4adc4bf3ddad546a9837121ece5c4052575b3c0150aa7688b202606a3af0ab2ad8aab83b537cff63a2c086620fcd88d360d4ec252c772684da40f61e6e198eee7c3994fe82b9c6a74d4c2bec9d1cb687e21c7d6accbeb1adba53008054263599df3ca93dc6b0a1be85e95af6e2d8318df16db3c81ebb8ed0ffa3c482cb6e5b5c4817281453d4459d8ffdbf194e470553d427e8311794aa540063d270717e49f741e2fc39aaf637b71ef2363ebe4dac44015cb079c8c2c3e7f8b77e0c74232cd7615ece6c49c89197d8518fcc69baafc9ccf2d350ce6dcb88cb274c84509bb03d32218bec159dd1684652f72eca05b7ffb2f687248a5c8edf003d6debfedba9338c5d374425e0fe6b89dccb8507daa1d79f7bd737311564da162aa718083947d9fbea304c1dcc8c68e5f8dae9f350e691802e9e1dc856be8b7a17fda541908f0c78ce859db1694eefa27c581ad529f093ed34e2ae8dfd6f9a910b180147620a14c1147c9552105195e95223ca25db7db0fef340ce99dd58cf2609cbebdf986d929af7f877198e11141486a840a17820630496049707bd6d1bb91721f3e96d968b5925cd1d8446a02f727f8c77ef2174c1d70434369c04c1169c4b07a0b7314104dfbabfa1d7d251427a71f86295fc6a3822a0be4bef6ab26fe36f5f44567eae2930f3f6f128d9cb9d133f57c5a0360b7b9b11d67da6e2fa174fa6d7c5c5ea3a8394d48688d5f64db9ef2fd5bd60877880094ba861778dbbd92854fcbdfc46178c08417273dbb64d2a238f50b4b360069ea5aaf860e17abd686f39e6d298a519887c14b6da00e35bf6ef59c16088dc481dfec10417465d85b18e5b954d9cadd63b602938c05bd257f7c1b319d65d87b451700d25cd3fd89913a849bc5ebac0f6566ba72e944b89310b8fac7bdbb9686bde77771d24fe3002eb551a95066a2056acac99949740ce54aa67e4f3bf009fe57897c69099dc35e45a7272ffd0ae14bb53fe70320af73db356ffe741ea78f8bf32628382ce5d56b340f64f04b3c0f148a24f5ac5021034f8326da2789d9b5bc2825129351e95c32dcc00f5afc943fa2d4d6e975b8163eeaa191985e58613623e4be0554e5f4ba9ee36615d2c59d08d6ed9dec7a7f23a1925942aa82166789c1fe48eeb9230e1974f08417003a14063ad48b031870dfeb2d2f3cb6668b0d84094cc7ef34941269fb25c344d35b03c221fc46b260529f844b90f9e59e0ad184e7565b7476079d5b0bc7e2278cb121fa561a04bb0493399cc418f1c7333afaf91627674f9c4f6fafa14bb138d41bd6c4864e49cfd14de9e3d1fa567bd356a305ac443e18f382284b058f5b57ff63b110ab4b69d145bf2ba2ddbddbc963d25bc2bc5aa474f4edbe8500ce960cbd31182e68b5a3a6b0a9c5c6e6ac7d7ae9fa63bf1545d4853f1dccf8d40b1498f96520b21d71bb82e46b95535e2a03b9d6d8efac8bc044192cdf78634f5365411269cc754771e069ff71631acfc58b869cfc2563ab5918a9d03975cfc89190379fc77d526c540d875eccb0aad3452379945b3d74bef485a96bf3df0f8da22aa933c2eab02d439a1057c2f376449a17c09fa9647a4b2191013978cb7a41de1649b07dcf33fda8db729cb4c2012dad00d732d7e822634174b34113aae4724b0b8f345cc44c929de9b3bc3c5da46f0f404d4edda99a46653a5a1046b2c13feae00fcfac2180696247d2a4f83f4eca82aa8cf4643c2d56c34b3b2e19bcb5341742768f4f7f6a272215175d38a55295b8c95dc978c79eeb4f2d1579008dc6f59cfe26cb4f9d6929df0e6ecfb329b1437a8a64d4e96f1e0aa7ee248b812ff499065133b7e0b93a61cba74839dc525499be51da60baf958696e991896e547ce4fde2a7bd1d80c3aeed04ec5faf23cc552ef6cb7c1787c397a9167a0d84729e38794547e75289ae04994ddfb628131c9b01f3a880294f90e94eb48eff64c7c915aaab0ea863cb13a68e80d0b805c195ed48389985f1707903145979596aacd36f1b1c5011146de23f6ef448d2420ffd714ae02721b42e1ce995a8d1d47cfa558ca325313a952a0cb968d179badafcafe5239cf7e1aa13109d7c4d6bed941544a16ada9373e165e92485a7e50cf68b581cd25df75b08a4995918e72b166cce8479d46f19e799f3c4eed351ffe6362e35fc04b18d17d6e554aad67f802f0f8fe2f409ed189c786fa1b69747934e4b6240db174cfb50612a27695063f9c35f86153232fcb0e0b78e8610e0c144ac15cac2e7acc5914763497217fc3568de2c6ea10d06787661de12b9aaa35144b0c6e9b880d8b4d2b5664d426a08ead0adadae4801d16604df1cf0a407f7455486159674b57e6314ce7aba05c938092de45f52be1ef64bb2860dc6973e53fcdf5614755a17c152b595d4fbb9c177c98af8004308c7a3e58353405f30e12346ae5e03a46e9f3e2f2f3bc0dcdebec278e5113782a0bdc69827ffce9d42eb1b23773729c4381f81685dc0e2738c2d3bd0ec063794d28ccd9b514d175d6db337b412feec3715756dd94407b223983b4288f2f4416242349a15be77e9fefbeacf5399cfa3046c9b2eb2bc6ed04b450dfb5afa74da06c5825f3ea5f05857dca99ab1d9dd4db4af60bed8c9487d317d3b13b228d4a4f22a1cb79f32463139ec1018d3226410c772e8b5acb5c508dff3641985a9fcc3b62348e5fbe050c109f35f148d7e7e62d2f7d3f6ef0c108eb2873af198dec2ea927b62a81610324f3e58e2de2468cd181bb7ed05c1c7ca1dd15e4054cdfa63c8b2adc35d193a181f72f0530f477fa31b1cee0abb4c75bc92e1387fa5b2360315ccca094a3cd79306d4835d4fa330fad2dd7fe8f", 0x1000}, {&(0x7f0000001b00)="97037905744847cd1d40d23533be189722ec4a2eb2184a33e0625161d7ce4bd056b3447035c19989fe931c3b89aaf03d921bedd010ccc33cde0f14765c181f7588afa8c68383b313de4f7b5d775c226adc4c96fcab5e057e0f0321397e04689be94e1b0f580b5c8469bd22e73dfd8b0533c4220508d03a85f02eaee3ede34a7192b85d4b29f98f231e3f3cb8cc5de393e34aa969aabbcd3e56f14914a95e15c417ae87353c30e40cdf488053ac0a7dfb39f14c3680c4634e48dbd7a1828395d738bc15645283702853bc928be558c23a5dcc77c0191997ec14d813386783fcea05", 0xe1}, {&(0x7f0000001c00)="94deff52d51632ebf60c02b82bd46f92fc50a485b998a82386c5efb425d0cadcb666d97805d90fc6634b8d62bd01765f44413da91472e24f4b5e1775e6de8962aa4ac8cb3711efcba030037fd549c156a49fa679c4447c0f1d7c9ead4b6007daf89f1dd7b5091af0e0df981b5f5cde5978baf626af21d07474fc383191150f69b9ba1e69f85c2bed1233183a11bf294e8a9a3b4a48db1479c4d13d07286d47d62d98007f9b1452f78448cbc91081770a4163958a536509efa3f824d197979b881f5a621adfc2496e0794bd1a4a9579", 0xcf}, {&(0x7f0000001d00)="ceb9e82a3f8c40399e04cf51c5fe71a252ae9e6a7da31b76a7f9ebd67e17f284a9b134cbea1de6b0b512c75d03b95974b96428770ca298268808faa58c0f176bc6e58005947159e6cd0aa353471eab8a3cd22ee14fd2a5e8c914", 0x5a}], 0x4, &(0x7f0000001dc0)=[{0x40, 0x1, 0x1582, "40d3e57cab24e77a343f4f1720deff996d16e3ba572245f97c05f19b80678bcdaee8d1bcb1c800d8d590e511b2eaf5"}, {0x1010, 0x110, 0x101, "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"}, {0x10, 0x0, 0x9a9}, {0xe8, 0x6, 0x4, "80eed711706fda1ed939964f80c2c3e324d6ea4350a7d6142bdf61acd860f252e4ce559a389299c0c12158a1acd1dd7ca8b4cd1e2accccf51cfb174b95d20f7010a43e3feb5fa210aa9f17f873c0463ec26c7b9fe217f23dc79eb6e9c7e81bfb787459a5a2abb4a4ea618fa8a9b8eedc2c3c015735fee4acd00183710edc729686acc7eba2fd24f0011f7f286906af96561f2a1477efb3a24a9bbfdd24a55cf644cdb0199bd65fc2f89e1bf6c79ba23a1d75379c4a6080597d0884bb79ee6c2aab807ad405e200db2c497a0b5f73a0027a"}, {0x98, 0x10f, 0x5, "5f40968326e1a1aa576cacc9492b93132c307f8d2bd1f6ffe155a05fb6eb97ff883e6cd221d97800bcaa43bbac93955b7860c22be06f7af3f9dce06774ca3d523690126618082c8fcfba5e8bb1f51b0eb887bd597a7eba2890b89f0c39a30a402e931e0ec3435400d2aa079585ebe2afeed20af5b440d0cca36d651a4808650f880a03d661d5"}, {0x58, 0x19f, 0x8, "ec954d5c74412a0760053f99963f7a734a1012c9b985b11d5d118f0b73832595f5439d8aa8d9d46ec71fa58634e4f817f41a0ad4081aa4a68e16f9e2121c670e60dde2"}, {0x1010, 0x11f, 0x6, "bbfd56cbaf591d67dbc3bc77229c1c2d96aa920d7a61dbbb213ae050d285dcd907c7f15b790d0ca4f06123f40d6ee01fb5b9846a92400881bca8cb7ea9f71ce80667418dbc46518cbd402282da0bf4349fa885aa51481ef2fd0ca093bddbcb6cf23ea0aed2634efb78039588a6574d0487977e561e03f6984d0619e468930cfbfabebcf4f730918722a83522baff565b876de2cce7f5b6816ec0e20724afabea7ca6fb6ac9cb29f3ade0ed19b27c8689dc7b2fa990beeac6fe65eaeb4a26dcac566fb416edfbe4ddaef367b56a4740402d0ee0041a842cce21344ab26e843805ee3ca2a04c95b405e21101d3c70f0a32e1a88af2e28cc28a8f6d3cb8be12c204c74309f7006adfeb681e64326b370cc9b9bc80c7da8bccb3ee878ba71a1fc10c2fb529bb76801071124165f5c8c2397e24a386cf801e6903e9bd113c8fe4cea21853d57b312ee2439f32df68c8097775660eebfd06abb37b383dbbf788bc0bcf60e8229009c5e9206c63c38de1fd12d2d63c7bc05959c38f92fc2a762950afb9b151e0a9e931302618da32ebdb6875629c5a75a88cf7b9d0f4f5ca0e9abbbc019e42197562436d16439aa1528218a887cae41ac6a71c01b90514f9f646414b40e8682d25c49e76718458df68a572b6944b63a857202e2a77fcbcb6aa096a19ea48c293cce7c972ffd917e88a833a28a56b0985ab065c1ebf09b872d7833bc1a7ffdd5fe8ea56a7591fe080d0fbaba710603c8433fe61701e85fe5ddfa6b6471e92724131e5379d5bbf610ab03d0f635e97d78efe293da0b5f846265e0dbcdc43532cbe2b750e3563e6fcda784af0c1b01d66ab876c4069c4a67a68188fe5f23273bcda9b5724128e3ff4b4de94a4eaa17af3f69cf1e4800a5b4db49612bdd71a9ac898f5ce65feb3f0b5f037e50a70647336bb73eaf2b3edcfe459dbe2f8507cc9dee731efdd8376111778a4198fef5ca923ec6bbe80356b23e42e5e2d4e859bc66b92ed29f6187abd9b9c9f4e9346d3d866be4b29ba37c3789e3d48fcb26eb15308579f88b2b64c2031df71aa60c5a1572a8f7bc19d4be1c0bc1f0d392f25a54c67734e762f4fcb9ff6d224530ac59e232f87f0a6d41da6be0acbcbf6d757fe7f1553722fe23e1e12edb3c726e6f6742d73775cb61206be8f0a1479357615519b3a77db93de4382c7fa1aed6d18efbdecdd1fa0b83799c5d022b4998b0cf589f3265dacf24c2cd2e20aadd34f9caeabeef384b42623d80015cb9ccffd55b01956a4ae6c1d0256924cc0437c584c3cfbbd219718133869e87102f1801cb4ad88b848b1eda1cd355220af4c21e5596eb78ab5dbeedca259bcb3cd0e0161255f5045ccb4f630a7a1a2cfe6710f5c40205bd8412bec47ec86aa76e712c6effd4cf824b910a87d59e14f9eaa8918b072150a0bc8b1e4964183aa42ea40792d676164e371a0f1be2fb48e7b610ea125e2b7f089672d1b6a78e955e098ec18669f4aad0650544b8e1d45a2ff9e72713ead6ca261286c73a0595a3adbc997bd3240d13e37c0405e262912dfd6789498b35e1b815a21e57e38b19d4c3b3ad19e292fbfef9b4bc609f76090b8a551f2b044331d55c5785a5c0d626bb2d03fe9538997bb401e30256aecc37f9762207bdadf60b448f1e5a2d8aabdb84fd9721e5039348f8f287c4c0c27499b4fe44b7b3c71de64caef63d01e2e0b91dbcd88c7dc06d88be17464503213ef3099b068aba2a54cc7d9443b68a5dab1b2fcf0837c84cd335aba247036fa52469f765f671ff8d15f61bf2ee02cfb9b3047b033f7866b1001eedee8f3faa0c21ab794c1bb8f5a091cc30b87d0dc5e72f49ad773aac03cefaa7d7d5b1c55571282f3a6f17d373babac732314c59c7d05c5e1bd403ce66f24ac5ebfabb9c7f42656a67a6cba3b421df8e12968c63c01fb710ad29bf685cec7d90367e8cd6f5cad887d3d430d5e25a8eecde21e223b6cdd14074ec3701ce9879b319c6a18eb8a3f4c817d9f84070f3a800ce8b4958ddc7cf2820fa27799b150f4b24f8269c136b7ee3f7f4af3608c6928f27b6d471c0544c10e6c7298e50649666758f04c10c26b5bdd73e67a5c1778b4837ad5f8197756ebf046644d37a8f856661e7df3a886a83144febd3300d4d0092e18dbbb894a32bb2f117951e83cac7ee81908e0cecdc9d183675f80196cc57fb87993c4e2d7421bd66a61d0bcf07f686d08d73cc60c0513966abde4b91c7c100656be87089c43982d6a8e03442738f8a498dc256d1ad7e6158068c95597e139b66a885c9e5e36a901e965ac3468a97f5cc49a08b7fa31b0008634a997abb17ec98ccf16e9dad597dd5ed63026c5c5f39cd433736dca8a23b606ec35e25a96f43e93c4d78c8be499875c463741394f0bbe43a9f4f3b3058ed25988360f4d0f6c760c7167e7f9e8543b7aba1c9289bc28178dc733501366d47ab3bd6549293a66bc2cd14aa91e25d60eaeb3cfcee6af33f5a2abfa63053ad5835266e0271609ac9e570320cb534361801d71dc8439096099569428c8b194cd0a135cf48d591a1148d77dd9fffdd85aac50f0275c204451602ddee3f7f5c672b587d30d73623c4641b14440e2a1bdb71086ed3a698750d6ca2ac6f5815ae3e30f8cd1aefb15879ab8d3780820094b1f964978ef356699d0179f5e82fc6079ed3dc2a4f4073d856d8be495766629eecc877331f4e687562ffc24a9246dfb5dc83ecfdb0e6bd1723916b199d0f173906be1f742d3a50607f4b3e94c8cccb2e28a14f316817a5f3130342709e5f6ef2510616e4f0e05d72712d35edae0c4958166927e8818413a788a0b36b003a02e286d233d24da4ed0c56b032744bcd5e86ba653ae33bbdf0866bb1ca93738d6dff8bde525ca0091770bbcfc21c0c456834283e1ca11d269ed61fbdb069eb02e0c72a23a7cac42fbd6bf816938248e9b6a58b6ce93cb4c3ed5d5c8cc3525f75b4de1b6b819d40ab66bb8a265bfa5ecc68ad201b6cebaee0f39907eeea6e55040b31612f488deb9eaa8936fb3c0b447d6eadace86f6c9915bfae55249ab6340593e7c50589f9361e586a5f27562205c836c3d85364558eb1162975c85bbacb1c1b1938a32ccd21f36a3ca17d1f2d607eac859a5eb4ac0976b8740be5f3b46ebeb025ce37479a04ae924df8ef5ce2fc1e0279f25979518e6b9b656f19fa375c3bb992c5fc468afaede072e155e3ea91ecd2b52de7410720635e4c504ffc7fed148b981f2029ae674f42f1325ffc59e2becdc6eca166d5cd94ea1e381c86d89a8be3fd77dfe9be6a35b25167989a23aefc394e0ec56f8e1f56c353c7bae3b83cdacc040666482639932ed09cb6a773089fc952364091ff9fc21bf1857fa68e0713f0aeb531f27aa3e27189929d582ceae01d4812026517c6b1305b9db473199b444af44871f761d26b29f4c457f288f5a3620b031d72bac06c321cde7a4baa302fd40244e0c247fc172613862864bb02d0ca494a217047bce35bd3d82ea4afbf71035e7f0ee6339f5fe0457585dbebe424b65ef99a6196ea7886e916a728b4596eacff32799c889fe6e0fe5521548c7e3be19616a2ea0771a80504044c6f70e9a915d9634d5b6e3170d3cd978ee4b54ca832a4396e5191c60d4265f474c08aa941b11ecd038657b61b176b3b7e0a34e4d3d3fa56afc86b428ded4af21af39a6db1eeb0203297ad230c631a03fa2f2f758b517679414973d42a199a92575a1b00768f453088ad3208b742c7b1579ba2d36f4818dcc1e30fa142c891475307333fdba7376bc9dd2937741d28623146cbf351e9d65131aeac35cfb8868187ba51feaa718d6694bac3662727cc432a749a66a8cd042da1cc6128ffb02e027086c9cf1e122b7892af5bd6576c82df1439f91d1e1ea046ee7b8f594f0e356a103c0fe1781c7b54839397a532e2d6107cd92e7c80328542a6cf2b39b60066c6a0dc1fa889452a3943701c0adbe4a6711379dfef963eb03827e964e4e9f4efa39b4343740cddf0eb81085630584b3b455167cc98bbcbb378365514c34180767535a566709e6699f69d3ab3492300de90e5f5858730670ca76139c8108148b36a007a1c43f113709692efb0c3272b5bea8ea13cd9ce3d7bf6976e6ad6f2c58ad44820262eb76ccff8b6805d4553942039d186a62f7929b60cdb47fc8ffac7e4e345e98396cf65f03ca957d83f6490453d28fab2e1b80cb7de08844a857228bd3be9b87bbe67478236102c7053aa8952cb5aad71a9dc56243dddaa761d16b30a47523dd53d681267123e504dea8343c29d5c9931a353732f98c73e6403d75fb1505c17094e5092777614eecb325fc9969f2b6beef062c29f5bb98b2cff56afccd525b32940f2e4bdcf2e6b78c4d52f6a658f7727782a5bc79b4d17e2ceb74161e26e15c13b45ab0e2d14cef4fbb44fd597d9b2239262248d4cd0a4ac5b4e27151b0056ef3e9d19ca4a02df7b48f45ee0424ec5c6c486a55ceef824a5be158d2fd0bb095a7e8aed0a7f8cff1485ee5e00f8ee8d14f9f2b1b36fb121c2db32ae963b2d7be4580e3949f894786af8e314dbef02756f1ef845df31862d3c02590f32ac87440b29710d3d307b4a8cf1c839ea04c79c9beaf6802454291fcdb31c3bc0a5c29ddd4d4113c1ee1af6e1fa3a3f153b8e1e3137273e7398b0ea961d9309c54a47be87dc24d0e9b4438a949b3b93a2ebc4f68da21b54b019328617baf28dcc1715e52b0d029e4b21fb1561846bd98ed10f2ed0476f932b9c3aadc4b7c30a998aa18f58af84a5a04b3ee4bd25a19d61debb9c82416ddafda4ec3ff8ab0c1b068673f96aacd78c6dd0bcecaf783fe4a82894d046756d5d51f23377c4653dd4027b959239c3928790ede74e650df950c2713877a2064a3e6540d491c2660654c336ae44fdb3609cb8509a746ae5ec013f7c30b2f324bf1ae0bb225c98fc41967edc692eb9603278ec722136f0532da4e9b14db41dd956fcf3d49ee6117fc7431e3224edbb4347b678ead4765521574c75a22c78bd5666f7109d360776dcc21f126b2511a4f09d277b2cf09919faade836fe44fa904fe8dcbee2489e0006b3e8df8ca430a4e4f9ad9ac045b2d9b244454926b4979f075336dc18dc712278376610d11ee46c3859c6b569fc8888480b8597f623d322bc22b43e678992f8848562edcde5c4dad2e3e5410293b772587492aa31f262e9dd7f66d8275bd9ebf627fcb9cdebce21496a1b1c705dac3c9994983981e2bd0a541f5a22ddf5da1d2c5f6b33308709a2f7b1485b7a0fc98d76a5ebfc9cf8c1d76fe7fdd988f546cfa91cf12c4fd31ff1903e8964e38aad958d4b21e8bda22fe340059f57d4a6d6f515d04d7594caa832a8b6517c80c3b37bffcdc84bfcbf49e7be04fb263a0ca75187cfed87931e10c0cb8fb0efa515a10069f19e0e24d08430ad467c68f14a2cab72f9e094ce424024015d161d2a3cc58fc840adeda719301bab652e01b3e00375f5fe04eb1bb491e4d01b2524e71fbe6b5cb75ca1aeef401b8366cd6f764482962b51d0dfdfa4abbf479d0c6881f22e3e3428285eb2b46376f637940e8388ab6264d640a9c0272d6fec6bba98d33ccd6e47dfa6ddc8fccc0590dc95b7572e2263ff942e22eb014b6c9f09bfa551c2b30fcec9b139fecd195b10c2aeed47ba08749991bc727086537ebefc45ce967594bf0f9db529b11029955eed907b986b4f02d3514d9d7e4fdbe375c7967d4f231be4fe66a2cebe1c7cae7ce72b9241129619825490feea41bcfd485abd5bc0ae678d3d98ff59b856113"}, {0xe8, 0x101, 0x3, "200607a674399e4632622ee8a384a7fc917e391e28250297afe40fabc104e45471b5ed01294d4836361ee08d63a4524cd3263a7178471e85bd72bc25afe969b2d7bc9b7c6c09440b8bad1ea600f6e8d441398cf14da34fb98144bfea1100234f21cf7b502e369586093c2644436625da6aa2f676e67b634c32347c375446f45a5bdf077fcad58f46f5791ffa3dfb66a7f853c1446be33f78f4338273ef4cb478521b77f2fb3a7fc3ef603b170ff2c50e92c3bee74d37020ee25c46d2a60619ad70c5783157f4162ff6a0a00d94497e8977b9acf7"}, {0x48, 0x0, 0x7, "930483459a9d355b7cf646fb542a5a21aa00ccf6e512df7bc191cd536344641077e10aa3eb53f3cd847a174094b53f6cfa73"}], 0x2378}, 0x1ff}, {{&(0x7f0000004180)=@hci={0x1f, r3, 0x1}, 0x80, &(0x7f0000006700)=[{&(0x7f0000004200)="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", 0x1000}, {&(0x7f0000005200)="454f9d38194e800300ab5708f0105e9cacaa36b59a8860642edcfa170ce96f3aea3f2af8408ed59a01ce96a7be60ac5122e8ddce97a025ca4afc2cfce3228941540fed03b2f027531bc90af60a4c515860229cdfde008f84b64a399a44b42458988d7373b0b79806d3464ec585d2b76869d29937b02ae6b1b473b32aa88dac9b7ef28eb1f9290d23bfe0b8bd356af43c7bb3857f8eb15581c608b07b343ff6b87a30038a744f7740bd7add7c60931d8f281c8863b81584a2fc1b9a9ec6f28b80a1d785870e9175107c9f1184a0797f6341df5219f4bab777be4532c880bb62", 0xdf}, {&(0x7f0000005300)="2bd041fb9ed49dd3963331db34db720bf39725174332a7f0e8aee0a6c8260fb3145c0f2a844cafcb841f1e220dc0bc16e77d6f9e5a242d92e62afc58b37f68e7884441c7d890af7d709a09a69e7125929d131c422ef5b0efc6953ccc362015bd8efb94cf23a6a5d40cbbb5ac24c87f9c323e0f5262fefad59922dea48193c3eb741a1f9079697db4650e1d948acc7559e57e6a4d1d05", 0x96}, {&(0x7f00000053c0)="435bb6997c1362c2819dcb44c9cea6528589074c841eb40adb09467b7888491e745f5d51a13e994bc476fc0233b24e83a918988844ae9fc7565695863d2c4715e449b227a6cd6edbe0b238350814ba04ee5f1798cc0770ab6d589c13a1f3f77b6312c57379806c51aada969742c89c8ed674a386d5be4c063c1fc472056c3232335a66639fa7e5c6f6566f4b0692ffa325a277e2ea5d37c4c19071f32dde20dc70b6f1ae8c", 0xa5}, {&(0x7f0000005480)="9f5b1c026575ecd8ae991a1345ed107f1b569084018d1ea4bd78d6a28c09d5101cf182a6a5ab1434bf549d981d1360d2061e985beb7fe2a63d16228b69181dd54b8c905662aa52de89323c412d3efaa10ea37ff4a74677cc72f88dce750ca052250d40e71fd3ccc263a30807bb64f0305921c2968fc5fba235a81349a1930cb7bccc30999642924028c0b1b5b2c4da792ac40680b87eece9c75d3df020d22112780def9b5a847b0c9ab6011a917967a68c0a98e9ea7bc8e5ad7b0bb317be9522a59665bfd382abb4b0cd0702ee2c05ebdf5c2f175e4b7917c3166b5c0105c2", 0xdf}, {&(0x7f0000005580)="9604307f49af93c677f68bbc2f497e0cdb1147222c9e69172ef883c2e2bfd252058270cdefa57ce93555ef6ce9c4d35a1394c1aba7b45869fbb5a2db19e0c017f56521d52451d599acb11597fc6c353335b44e9693c214661cc4a7d128bce130a2e50bb60401c46024e2477fff9a44eae7b583f5907cdae1e6bca915c63fe2d57b0fa425b611d51896fef4", 0x8b}, {&(0x7f0000005640)="6e683b35980f9a62fe30d9281d78f2ecc42844693c64d2b758e2ccdcc93dc54ac70e2f2f936cdbb51ecc4144799d38f598bb3e6ffe6ce4fb075ce809667ab79f7cc52bf4d1762abe68514f7d2df33be843574f62b890cd4d6eb5c890d1cbc9712beb11dd471da01f140d1fa8408878c962db5e63caadce22305b9eaf0aa0cc182d0f12d43177942ef945ee1ec4fa980ffbb741e32602271afd80b0fafff46d4f176e65a775684852b7425daed55cbd949f6af2", 0xb3}, {&(0x7f0000005700)="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", 0x1000}], 0x8, &(0x7f0000006780)=[{0x58, 0x113, 0x100000000, "6ac65681cfbfdd758eec6329663459f48633df20d3ec4bb1831f9372160b26a5b6b5bf533535546df941c091b37310de941711d89644532f8770caa5e7ceee775fbcaa4f2fb187"}, {0xd0, 0x13f, 0x4c53, "202adcc80430e4d992438c6f3a37f8d5e981c8c4802fdc5db28dee4dd4fab64154a16db30638f3eca322daa7f511e5e3cf6cd55cb29c20f0fd0093dbb3a39e0518c8076097de72d898613cad04a188a2c58302857743be88419496190a8d7b6d2359a8b7779498e1633eb7bc617c85a4c03db9eb5297ec10ba1120bd98ad2e18ccaf5ed5802ffd8836d865b13203856e0c8adf4d9c078f722288c67acb447f33c4ef81b900b8641b107b4271832edeabcc49b9f2cd16ab1b4cb0"}, {0xc0, 0x10c, 0x101, "185f81c3588b2a0cf74d6850b96e108d0cb7b350c75a94bd8c2f1fb4c9c709f6381f727687279215c0e9ddb186fc6a1cb75bd603a76ce80b8ff75be33dcad4528ec01f8bc51f21a4eaa08a0580691c318601ceeb961efc52cb552aa9df44834b57fa1fc49d523435500221793bdbb44c144a06761704227cd19b7d415b5115ec95c3b8bd81d28fae79dc35ca11792b279258caf017bb7b6fbc8397c918919c3b08f548a241b6da3a058ad8d7"}], 0x1e8}, 0x4}, {{&(0x7f0000006980)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x400, @mcast2, 0x3}}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000006a00)="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", 0x1000}, {&(0x7f0000007a00)="77645cd8168025882073dd63e7d9b2d7e42b164070a246b5640846150204aac5248e1f7450ae1c417fb7d92ddd1119112d67601973ff42d21eb2bb0aa960e5784e878b6339a84bf8471ff0fd82b6dae9eab8c72516312cbe883a5d7383b42b65e416480d7cc5c16e61a15e64bac2cacb169c", 0x72}, {&(0x7f0000007a80)="9d9d09853a0be091c74db7e0118b4a8f53c1bee12f59d021fc68ecf109fd059392ad5d093fc5fed837b27dba8fe3e39dcb8cf6c4a044cfbd47", 0x39}], 0x3, &(0x7f0000007b00)=[{0xf0, 0x1ff, 0x8, "4ae947c88121b9b9292ce5e1f337f29ddd3427a7543d22b2907233b44c0f0ef322d7346e98de79c027861fa33fe75e658fe06cc4e1a9de7eff2a10dbc18e83d3c0c4273c5a0d4568d413cfb73eb2a479dde569ee03ef6e85a100fa2cba24f09bf889c9145ddcdacecf89a3d646f1ff4e36700bc838bb80a23c6f1b5c04f9ff3793892fdb379b2b34d42776110f65f0b1c59946306c123a8612858e87b358606c7ea31ebb002a3fee1879306fe315ed6bcb9b7bac076c7805d88699dc400576024d83d4d47812fe2be09f9c7f2d6547526917ac2bd0bea523411880178023dc54"}, {0x30, 0x10a, 0xfffffffffffffff9, "081c7202eefbf880a913a9f4415a67050035ed028d7ad4151c2e80d69d"}, {0xd8, 0x1bf, 0x7fffffff, "b3eff35edc0a57d3211b952d26517067fe12e9c2424638b0e9274ef68e56718e639c211496250855ff5ad7de606e508462bc250e41c9b2cee272eddb5c01e3c81d653ee8e32fbf5127a56153eff0d9788e05a3387abd06943b01349bcf4686926f489b88ca59bf05220ca0d6d2d99485d57bce38aaf79e1fa0d6894ff4f249001d45c502243cfea2088292600f32f96bea9a32124462ce35fc71cc86a37c817685e61a9830f02a9b21581b9446583e720a1e178f137bea35edeb1241fdff52578ad6c52dcab89e"}, {0xd0, 0x11f, 0x4, "6c5118bca12f7ef9576690f6b71961dd97f22025ba02c8c9a65f9aa8c45846ebb2def1b9743b8a514d0d13f2b86a41c0e7f1b9d22be0c81b8a7498d5ec5c4ace1355d9b4ae428b30913665d74a9c40fdd51b9387f2daec53f6b55d21e41decdcf5cf87f1caf302f0e55da95d9c6ff8889134ef9c2c170842e3d70010031b1d0bd7138e4a57f1c622a425879cf9c610af2c9e73b4c25c21efe9c679cead2a69361da1af008a9f00e3b55514584f8ffcd233f92ce63f5d62c3a987b3c2bea3e88e"}], 0x2c8}}], 0x6, 0x4000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) ptrace(0x11, r0) 20:30:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:02 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x100000b5, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter6\x00') io_setup(0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r4, 0x800, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x33905486da3b23e6}, 0x80) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000), 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r6 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r2, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8150052}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r6, 0x114}, 0x14}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) splice(r1, 0x0, r3, 0x0, 0x200010005, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000008c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000300)=ANY=[@ANYBLOB="00fe000000000000000100000000516c0198a9d63f74846c320a30e300ed00000000000cb128c6462af1a94e4045a8639e24f0814a49faff3bdacb861eca45e1287ab8e7a7c307de9fe5c4c7c28e79720d8ce7535fc38e0c321d8a07da1ad6d660f02b55a546c645347b8a06ca0a902d5413554a23e325950352da4e991b73c8d467f297e613043ce6a2aab419d424268da6c2c473831fb757dda6319e03a1f1185b42ba"], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x4e20, @empty}, 'nr0\x00'}) 20:30:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getegid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r3) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = dup2(r4, r0) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000040)={0x80000000, 0x1ff, 0xfffffffffffffff8, 0x0, 0x13, 0x9, 0x100, 0x4, 0x4, 0x40}) write$uinput_user_dev(r4, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r4, 0x0, 0xe5) 20:30:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x01\xc7\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000640)='mem\x00\x01y.swaS.cursent\x00\xc6ux\'\x05o]O\x81m\x1d\xdf\x9d\xf5\x83\xd8M\x9a\xbb\xd0\xa6\x13\x94\xc6\x19S\xc7\x01\x89,\xf2I\xdf\xcfN\x95\x19\x86\x83Gv\x85f\xf8\xff\xff\xff\xc3\xd2\x9c\x04\x12\xa45q\xa2\x99\xfd\r\xb0\a\xa1>\x174s\xa8\xc8a\x8cbVG)\x96\xea]\xbc\xdc1\x02\\H\x04H\a3akt\x12\xf2\x98MA\xfa\xadeq\xaf]\\\x86\xe0*\xec\x98\xe1\x9c\xdb\xe1\x1c1\xffs\xddG\xcdW4\x11\xfa\xa1\x88cA\n)vX\x1d\x9c\x9f\xd0U\xb8\x9e\xf8\xff\xff\xff\xff\x99O\x84aa\xfd\xeaw@\"\xc9\x80\xae\x8aV\xd5\x1akF\xecx\b\x81\xa2*r\x0e\f)\x16\xcaV{\xee\x83\x850xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000380)={0x0, 0x3, 0x8, 0x2, 0x4}) write(r2, &(0x7f0000000340), 0x10000014c) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) keyctl$join(0x1, 0x0) unshare(0x40040200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000001c0)=0xd84, 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'ipddp0\x00', 0x200}) clock_nanosleep(0x4, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000180)) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1f) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), &(0x7f0000000280)=0x4) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e23, 0x1, @ipv4={[], [], @local}, 0x8}, 0x1c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioprio_set$pid(0x2, r4, 0x6) [ 231.941491] kauditd_printk_skb: 368 callbacks suppressed [ 231.941498] audit: type=1400 audit(1549139402.927:3591): avc: denied { map } for pid=7980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:03 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) symlink(0x0, 0x0) umount2(&(0x7f0000000180)='../file0\x00', 0x2) 20:30:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000100), 0x1cf}}], 0x4000149, 0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 20:30:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000040)=0x7, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x1, 0x84, 0xa733}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r1, 0x89b7, &(0x7f0000000080)={'team_slave_1\x00', @ifru_mtu=0x8}) [ 232.134796] audit: type=1400 audit(1549139402.927:3592): avc: denied { map } for pid=7978 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 232.359148] audit: type=1400 audit(1549139402.937:3593): avc: denied { map } for pid=7978 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 232.510939] SELinux: failed to load policy 20:30:03 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001b00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xd677336f84285b6a}, 0x90) r1 = dup(0xffffffffffffffff) read$eventfd(r1, &(0x7f0000000100), 0xfffffe61) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000000)="390000001300090468fe07000000065f5085b83f03000000450001070000001404001a000600000000ffffffff00000800005d14dfb51571a4", 0x39}], 0x1) io_submit(0x0, 0x1, &(0x7f0000001880)=[0x0]) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffd072decb26f2ff46537f2afb6126a7641f698034b2c24b11df1ee7e53fdea6086503912ec96d8f0132c54fa6cbe5018115fd49fe481e644f945d87766761ef078f95e439"]) link(&(0x7f00000018c0)='./file0\x00', 0x0) write$P9_RMKDIR(r0, 0xfffffffffffffffd, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0xd) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4800}, 0x1) sendfile(r2, r4, 0x0, 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000600)) syz_open_dev$sndtimer(0xffffffffffffffff, 0x0, 0x20800) 20:30:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 232.534942] audit: type=1400 audit(1549139402.957:3594): avc: denied { map } for pid=7980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010002e700000000a3a20404ff7e", 0x24}], 0x30}, 0x800) 20:30:03 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) gettid() r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0x200a0140100, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) tgkill(r0, 0x0, 0x35) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="a80000002f0978220000a15dc7eafabd92276b6458e3f43a82346d0ea0"], 0x0}, 0x48) 20:30:03 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000140)={0x2, 0x9, 0x1ff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa58, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendfile(r2, r2, 0x0, 0x8800000) [ 232.689638] audit: type=1400 audit(1549139402.957:3595): avc: denied { map } for pid=7980 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 232.788037] SELinux: failed to load policy [ 232.840703] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 232.847582] audit: audit_backlog=65 > audit_backlog_limit=64 [ 232.857245] audit: audit_backlog=65 > audit_backlog_limit=64 [ 232.860556] audit: type=1400 audit(1549139402.957:3596): avc: denied { map } for pid=7980 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:03 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x1, 0x480) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000000c0)) syz_emit_ethernet(0x36d, &(0x7f0000000180)=ANY=[@ANYBLOB="aa52aaaa05000180c200000008004500035f000000000011907800000000e000000100004e210008907854a2219553ee7cc1b773ea5ef2e33b4563fd97be9f89f80a3f5e59c5c8abe16e68e6bfbb3bdc9fdb3aa0becffcb3860bfe29f6cf870d2c6a42a5f79a24e8cabe746a99ed46bd801e4e8c96291e7327eae66510a2da49f6c302e9041bdf25924ff8c90fa4fba632b3da8194bb82e7324dcbfc6821ef3884a94b315dcf4f76180ed5f01e63b378055703428db051d9"], 0x0) [ 232.863978] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 232.905024] netlink: 13 bytes leftover after parsing attributes in process `syz-executor0'. [ 232.918446] audit: audit_backlog=65 > audit_backlog_limit=64 20:30:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 232.938431] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 233.179974] SELinux: failed to load policy 20:30:04 executing program 5: utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x3, 0x9}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x201, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e22, @empty}, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8800}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="199efadd", @ANYRES16=r1, @ANYBLOB="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"], 0x1bc}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000240)=@get={0x1, &(0x7f0000000180)=""/137, 0x5}) getsockopt$inet_mreqsrc(r2, 0x0, 0x9fa80f3dd55bf4fa, &(0x7f0000000000)={@dev, @remote, @remote}, &(0x7f00000002c0)=0xc) setresuid(0x0, 0xee01, 0x0) utime(&(0x7f0000000280)='./file0\x00', 0x0) 20:30:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:04 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTAT(r0, &(0x7f0000000a40)={0x73, 0x7d, 0x1, {0x0, 0x6c, 0x2, 0x7000000, {0x16, 0x14001, 0xa}, 0x10000000, 0xb014, 0x4, 0x5, 0x6, 'vmnet1', 0x16, 'securitycpusetsecurity', 0x4, 'bdev', 0x19, '^[GPL!%wlan19%eth0ppp1em1'}}, 0x73) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x10}) write$binfmt_elf64(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x8f8) 20:30:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) r0 = creat(&(0x7f0000000140)='./bus\x00', 0xfffffffffffff7ff) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000500)=0x949, 0x4) fcntl$setstatus(r1, 0x4, 0x42000) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) setresuid(0x0, 0xee01, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 20:30:04 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001b00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xd677336f84285b6a}, 0x90) r1 = dup(0xffffffffffffffff) read$eventfd(r1, &(0x7f0000000100), 0xfffffe61) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000000)="390000001300090468fe07000000065f5085b83f03000000450001070000001404001a000600000000ffffffff00000800005d14dfb51571a4", 0x39}], 0x1) io_submit(0x0, 0x1, &(0x7f0000001880)=[0x0]) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffd072decb26f2ff46537f2afb6126a7641f698034b2c24b11df1ee7e53fdea6086503912ec96d8f0132c54fa6cbe5018115fd49fe481e644f945d87766761ef078f95e439"]) link(&(0x7f00000018c0)='./file0\x00', 0x0) write$P9_RMKDIR(r0, 0xfffffffffffffffd, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0xd) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4800}, 0x1) sendfile(r2, r4, 0x0, 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000600)) syz_open_dev$sndtimer(0xffffffffffffffff, 0x0, 0x20800) 20:30:04 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x6) pipe2(0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000001c0)=0xc) getdents(r1, &(0x7f0000000000)=""/46, 0xffffffffffffffb7) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="07000000000000007af7ffffff0000000200020000000300", @ANYRES32=r0, @ANYBLOB="00000000d9a500000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000040000000000000000000000000000000000000000000000"]) r3 = add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r3) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{}, {r1, 0x8}, {}], 0x3, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') keyctl$search(0xa, r3, &(0x7f0000000040)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, r3) creat(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) 20:30:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 233.627026] EXT4-fs warning (device sda1): verify_group_input:123: Last group not full [ 233.636265] SELinux: failed to load policy [ 233.696779] netlink: 13 bytes leftover after parsing attributes in process `syz-executor0'. [ 233.713466] EXT4-fs warning (device sda1): verify_group_input:123: Last group not full 20:30:04 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000003c0)) r0 = socket$packet(0x11, 0x0, 0x300) openat$keychord(0xffffffffffffff9c, &(0x7f0000000300)='/dev/keychord\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x44) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000200)="1bba9881586f4e42eaaabfda66b0a1e4e1fd582e19ea7d64f00246bc4ffec0de9c1879a8e2f74191e7df733bdb59424164add2a196e123d31b97608bcc9a50f87e56ccd857373b0e165ce7bef0fe3ffd1786f53d876231a126446d63b88a92637e836124001acccb61d9640091cbeb3b47e54a81d3b2fc4ac9fcab487004b6d837d9bbff530265f1f108cba05967a9cae070bca88e84853c131a1d36b2a4f612f0e2d3a1ad3a2d0f66152122bfb4a90751b29db5e673349186d3d98707e74e71a86b432a969a1e924d526f5cb448229d4acb5310336b92da476415d51b01c085eefa1186041dc957c6aadf868551fdac4a409186455452fe3729496ecb402c99") r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00f36b4c9386f1f12519c840ef8a00004ab50e98043a2c26cde9bdac1c3ae501f55a83a6dc1c4e9c22e181ebd70749"], 0x28}}, 0x0) dup2(r1, r2) 20:30:04 executing program 3: socketpair$unix(0x1, 0x40400000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80003, 0x0) write(r1, &(0x7f0000000340)="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", 0xfc) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) 20:30:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x22c2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r2, 0x213, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netdevsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000240)={0xf97cff8c, 0x8, 'SE Linux', "12000000014c00000695219a2da5aa6e"}, 0x20) [ 233.901876] SELinux: failed to load policy 20:30:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 233.961741] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 20:30:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'netdevsim0\x00', 0x3}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000680)=ANY=[@ANYBLOB="ff030000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000540)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000740)={0x290, r5, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x942}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xd3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7dbb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xdfef}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x776}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x33}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800000000}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6be1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcd}]}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x290}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r6 = add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="c765e482ebc22cc7836c4b0391815690", 0x10, 0xfffffffffffffff9) r7 = add_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)="48c34fcc9534bd55868b15d6b3b94f6ff03d37d404a47f433086ad5877caeb0f6c58dec670140c71efe7018957", 0x2d, 0xfffffffffffffff8) r8 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000500)="d53ca5", 0x3, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000580)={r6, r7, r8}, &(0x7f0000000a00)=""/4096, 0x1000, &(0x7f0000000600)={&(0x7f00000005c0)={'sha224-arm64\x00'}, &(0x7f0000001a00)="b74866f69f15147e90d8d297af81e7df647a063fa1293403d250197c08eea4d1bd29ea03987f44d4f73771030983681b0ec264288fc880a2848b4598d0017e6c074551c7f9172bfa3693e51c878827e9d0b5c8bd74a9e6fd6e558706a74124c329d6f32cf29bc095762b73aee0aaba0cd2029eb6dd68b3582eef23192765b5a2c889e46e1dc2a7ff2634818fd50ece25077c4b728d562a93e0bfdcc2bff78c575002e3aa593c72e9b7b90dda433b2d9d23f3b81b32f720468af48699e2bbc07edc1c1a4e61fb99485b7bdb61a767f3b802fdc7e8d1fc00e1d153e36bf290be13", 0xe0}) tkill(r4, 0x17) 20:30:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 234.148835] SELinux: security policydb version 18 (MLS) not backwards compatible [ 234.221899] SELinux: failed to load policy 20:30:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0x100}, {0x80000006}]}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x8, @mcast1, 0x4}, 0x1c) close(r3) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[], 0x4240a3c3) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) [ 234.310814] SELinux: security policydb version 18 (MLS) not backwards compatible [ 234.330260] SELinux: failed to load policy 20:30:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 234.765784] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 20:30:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) recvmmsg(r1, &(0x7f0000004900)=[{{&(0x7f0000000180)=@un=@abs, 0x80, &(0x7f0000001300)=[{&(0x7f00000012c0)=""/21, 0x15}], 0x1}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000003400)=""/112, 0x70}, {&(0x7f0000003480)=""/224, 0xe0}, {&(0x7f0000003580)=""/55, 0x37}], 0x4}, 0x9}, {{&(0x7f0000004640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000004800)=[{&(0x7f00000046c0)=""/176, 0xb0}], 0x1, &(0x7f0000004840)=""/147, 0x93}, 0x3}], 0x3, 0x40002060, 0x0) sendto(r1, &(0x7f0000000080)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0xfffffffffffffe59) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000000c0), 0x0}, 0x20) dup2(r0, r1) timerfd_gettime(r2, &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) 20:30:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x80028}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000140)=ANY=[@ANYBLOB="110cb0e6cddf4c55f4aa89bc6c8ee8c6cfad384b48d2f89607c32125680c9e670e2c64fa92ff751eb9f86c8e6a1394fb335f7e7ede43f203d711dbd5a815be37c0c048b4d37f84110f7490aae23cbd1fa9346deb24ee16effb8b42b73a9213af9e500ef1eb5da2090bf75a"], 0x1}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x37) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) sched_getattr(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x8) set_thread_area(0x0) close(r0) accept4(r1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x2, 0x0) 20:30:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x5, 0x80, 0x6, 0x10a7e534, 0x410}) write(r0, &(0x7f0000000000)="220000002100070700be0000090007010a00001e00003c0000ff040405000c008c35", 0x22) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x800) 20:30:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x4, 0x0, 0x0, 0xf47, 0x3, 0x2, 0x0, 0xa74, 0x5, 0x0, 0x1}) mkdir(0x0, 0x8000000000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(r3, 0x0, 0x1, 0x0, &(0x7f0000000040)) connect$unix(r3, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) fcntl$notify(r4, 0x402, 0x0) read(r1, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace52", 0x2d, 0xffffffffffffffff) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x1, 0x0, 0xa4a, 0x5, 0x0, 0x80, 0x20000, 0x0, 0x40, 0x5, 0x0, 0x8, 0x0, 0xe468, 0x7, 0x0, 0x1, 0x8, 0xfffffffffffffff9, 0xde, 0xffffffffffffffe0, 0x3, 0x1, 0x2, 0x970, 0x1fc00, 0x0, 0x101, 0x0, 0x0, 0x7, 0x3, 0x0, 0x6, 0x9, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x586e}, 0x20, 0x0, 0x51a3, 0x0, 0x5, 0x200, 0x7}, 0x0, 0xe, r2, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") connect(r4, &(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @multicast2}, 0x2, 0x1, 0x3, 0x4}}, 0x80) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="000000000000000000f1e9f74948ce488b8a7c35ab7748403187c5dc884191f9d30f35e9f5f7c72a98e3bef7f1adfcc77853070df242ac521a08f1faaa4291c62450365c3ca4479174eb07e0a6fd56f9ece95b401238ed1b9c1c8fee1fed3463fd88c86f30aece8df326dd4e37f71482"], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x8000, &(0x7f0000000340)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mprotect(&(0x7f00008ca000/0x2000)=nil, 0x2000, 0x1000000) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000240)=0x9, 0x4) 20:30:06 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000200)=""/214, &(0x7f0000000300)=0xd6) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e24, 0x8, @rand_addr="e2849b7fc22b4051227648caf15c35ca", 0x12c}, {0xa, 0x4e23, 0x6, @mcast2, 0x1}, 0x400, [0x1, 0xbdfb, 0xf298, 0x3, 0xff, 0x7, 0x2, 0x8001]}, 0x5c) open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) rt_sigsuspend(&(0x7f0000000100)={0xf3b8}, 0x8) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hpfs\xb8,\x80z\b\x1f+\xf9\xb1\xe6O<\x1ai\x83\x95\'\x926\xe0\xf6\xcc\x98\xf6\xac\x1b\xaf\x8e\x16P\xa6\x7f6\x10\xaa0\x01\x8f\xe5\xb8V\xc6\x8a\x03\xea@\xcc\x96\f\xebh\xf9\xa5\xbd\x86\x14\x83\xd3\xf1\xb0\xb0=\b\xd1>,\x16z\xf0\x9d\xd8;\x87\xf4\x1dRA\xbf\xb9q\a\x0e\xa6\xf1]\xa7\xcbkO]\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0xc0000) 20:30:06 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000011c0)='/selinux/enforce\x00', 0x80, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) write(r1, &(0x7f0000000040)="eba820e0477193d24d554130984ebc30bdf4897717d19587dbf52562d6d055b3f93925545fc82315ea7b89719a61ed049d4e9931ebb81a22a925999738a1bc05c66c4cfebfb04365f1846d3c88efd75d8ddecf797c40fdec35a53c6db6159112061a74221d209c8e1bcbf26dee26e73c04df3c788e343e7c4e8b7233472d23bc4dbc43ebaea303a7013df64c88b4a6005bf785773ee5a7c66c", 0x99) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x5c3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x101, 0x0) setsockopt(r3, 0x5, 0x8, &(0x7f00000001c0)="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", 0x1000) ioprio_set$pid(0x1, r2, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="ccf96200", 0x4, 0x11, 0x0, 0x0) 20:30:06 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:06 executing program 0: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0xffffffffffffff2f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000005a000/0x1000)=nil, 0x1000, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000280)='(\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x84300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x1be, 0x100000001}) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x3, 0x100000000}) 20:30:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000003b00)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x481040}, 0xc, &(0x7f0000003ac0)=[{&(0x7f0000000100)={0x4c, 0x2c, 0x800, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x3c, 0x70, @binary="7e52a67b0808881625020485242cbfaedae91f5d0dd5e64ce6df708fa33418b8b72b2f0b82ef22c3fb21e8a69d61a29062eeb8bfc601"}]}, 0x4c}, {&(0x7f00000023c0)={0x10, 0x1f, 0x9}, 0x10}], 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x200, 0x0) execveat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='\x00', &(0x7f0000000500)='selfeth1\x00', &(0x7f0000000540)='wlan0&}]\x00', &(0x7f0000000580)='\'+#\x00'], &(0x7f00000007c0)=[&(0x7f0000000600)='\x00', &(0x7f0000000640)='vmnet1\x00', &(0x7f0000000680)='\x00', &(0x7f00000006c0)='#(.GPLvmnet1.\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)=',\x00', &(0x7f0000000780)='ppp0vmnet1vmnet1\x00'], 0x800) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@x25, 0xffffffffffffffb8, &(0x7f0000000b00)=[{&(0x7f00000008c0)=""/114}, {&(0x7f0000000940)=""/129}, {&(0x7f0000000a00)=""/231}], 0x0, &(0x7f0000000400)}, 0x40000040) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 20:30:06 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 235.515236] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=44 sclass=netlink_xfrm_socket pig=8179 comm=syz-executor2 20:30:06 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r2, 0x8}, {r1, 0x100}, {r1, 0xd7cdcfd2aacab165}, {r1}, {r0, 0x4}, {r2, 0x1200}, {r2}], 0x7, &(0x7f0000000100)={r3, r4+10000000}, &(0x7f0000000140)={0x8}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="85000000ad76000007000100000000009500000000000000"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x12, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a000000", 0x0, 0x401}, 0x28) [ 235.560818] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=44 sclass=netlink_xfrm_socket pig=8179 comm=syz-executor2 20:30:06 executing program 2: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) fcntl$setown(r0, 0x8, r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x482203, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) sendto$unix(r3, &(0x7f00000001c0)="58c0948aa0ca47841afacbfccfba32cfea93488ee773472807127163798cf617a61e0018d95454f37a2066f9ebcbdc27a33e5536b2de34ab6b6fe91c7eb7e1167a4ba1a2983c8a264033b750d1d8dbb9386306430d3d7538e71b0737edb12524cfa4ce7021f7c4ed7ec1d013d4cc50fc5e6f88666fc10f20b130249ca57c57374e8454f834d80c8229f022b2852e9289317ff219ddf4167ac7510579ca29483329f8", 0xa2, 0x24000801, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file2\x00') 20:30:06 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigpending(0x0, 0x507) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x8933, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff89, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x2}]}, &(0x7f0000f6bffb)='GPL\x00', 0x800000008000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:30:06 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) quotactl(0x4, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000300)="83500a28ed08e09417ff73d3a4fca27ccbee2cbd9992ff0fd101ce798034aab3a2db0d3291ee5e96da74c3c0ae26d2ddd532e3b111714a457e47cff02f138b6e1a92069418517e120f75897381bfcd7303cfdacf68cbcac3a2f7b582569c31136f6ae95aa24246b21cfaeb448b4b6bbfae6a7edc7b8f500e545db4e27ca5aba0ae4fc63e") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x0) [ 235.932257] sel_write_load: 1 callbacks suppressed [ 235.932261] SELinux: failed to load policy 20:30:07 executing program 4: r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}, 0x10) sendmmsg(r3, &(0x7f00000014c0), 0x40000000000018d, 0x0) 20:30:07 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = openat$keychord(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r2 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='/dev/loop#\x00', 0xfffffffffffffffd) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x24000084}, 0x2000c045) keyctl$assume_authority(0x10, r2) write$selinux_validatetrans(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x134) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x1f) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/20, 0x14) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) syz_open_procfs(r3, &(0x7f0000000440)='wchan\x00') ioprio_set$pid(0x0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x2000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_pts(r4, 0x80000) r5 = gettid() clone(0x8040000, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x11) wait4(r5, 0x0, 0x4, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/validatetrans\x00', 0x1, 0x0) ptrace$getregset(0x4204, r5, 0x7, &(0x7f00000000c0)={&(0x7f0000000040)=""/118, 0x76}) ptrace$getregs(0xffffffffffffffff, r5, 0x9, &(0x7f0000000540)=""/247) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x1, 0x0, 0x8, "8c13df3fa9583980b7222f38c3a97e1a1d0f1907b79d5ee7a9f5fcf8f6051cb35dbd1a894d83b79573cce363392ad0c70194e2595810deb7b305fc1266234718", "43d8c2d90be10c0ac7274dc2f7eb8b9abb9838a652640a38b118816238d041c0f83bb193b1de03eeab4f8fbd82b350399b1363e5ea0d718bf63afb5319aee15b", "defe39737232ce5a4dba6f680a26afb6947308ec7c694931ce85276be2fb29cc", [0x5, 0x3]}) 20:30:07 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:07 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) timerfd_create(0x0, 0x800) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x30000, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00'}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) socket(0x11, 0x6, 0x3ff) r2 = accept4$unix(0xffffffffffffff9c, &(0x7f00000001c0), &(0x7f0000000240)=0x6e, 0x80800) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) r4 = dup3(r2, r1, 0x80000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060107031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 236.370327] SELinux: failed to load policy 20:30:07 executing program 0: openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) write$P9_RGETLOCK(r0, &(0x7f00000000c0)={0x1e, 0x37, 0x1, {0x0, 0x8, 0x7, r1}}, 0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0xa0140100, 0x0, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000240)="c6f4abe308b368db8f5a4c17e15803df7825412a62dc6ed282d574ca5ba94989845e158a1ccef7b2387788dd32396f634927fd3b76865cc8d2bddf6853a935718380c27b651d6bfdb65662321b91841a513ccb976ae6faf3116a309c4e5f0b4ed63f46d14bce6f92fb4a84fab8fdbbdeab8f77071ffd5622d7f646683df09031875bc9686df853f1a51b2429a0d957ad3afb16c50d4fce9e5b7b9245e1ac85b4f9fb8c6d1e033e1e7340627ee4fce60a4ecc956961b2cbb37ef23e86ae2d41a10172d689b9077afbbf20574aaf25b14267", 0xd1, 0x4000, &(0x7f0000000340)=@tipc=@name={0x1e, 0x2, 0x1, {{0x43, 0x2}, 0x2}}, 0x80) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, r3, 0x304, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x10) write$tun(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000600ffffffff054f9abec1b20a127c456e800000000000000000000000000000"], 0x24) 20:30:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x4, 0x1000000000003, 0xffffffffffffffff, 0xffffffffffffff9c, 0x7}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffc, 0x0, 0x820002, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") bpf$MAP_DELETE_ELEM(0x3, &(0x7f00004f1ff0)={r0, &(0x7f0000068000)}, 0x10) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797a302fec31bf3524da2776ac406c68c7a98898791611173fc1de44dc35f2a5c54b4519ccc9069ae0ebfa33a65690eb010a262fe26d394f917bb75a66d0023471fda326f67bbfa3a13774b4cb3589557d9165aaba740f8297e7f8c2c82cd49edd36d5e8f775df3f2b612c0998a55c4edbc8d2fe9e75a57070ac8d23dbdd6a58b8244d92cc1ffcc2cf951047c47efc40"], 0x91) 20:30:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xd2}}, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'lo#proc,-\xc5\x00'}, &(0x7f0000000140)='\x00', 0x1, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02050609100000000000004c9e00000002000b7b02000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000fe0000020000000005000500000000000a000000000000000e0000190900000000170000000000000000000000008000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 20:30:07 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00\x82,\x12\xe6\xf1\xd0\x90\x82[K\xb2\x97\xd4\'\xd9\xd2\xec\x82f\xc8\xe0p\xdb\x1d7\xccv\xccqB\x9f\xd80x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000001c0)=0xe8) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x7) r2 = getuid() syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x80000001, 0x0, &(0x7f0000000080), 0x802000, &(0x7f0000000200)={[{@nodiscard='nodiscard'}, {@dioread_nolock='dioread_nolock'}, {@bsdgroups='bsdgroups'}, {@nomblk_io_submit='nomblk_io_submit'}, {@bsddf='bsddf'}], [{@euid_eq={'euid', 0x3d, r0}}, {@obj_user={'obj_user', 0x3d, 'vmnet0@,'}}, {@appraise='appraise'}, {@measure='measure'}, {@euid_eq={'euid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@smackfsfloor={'smackfsfloor', 0x3d, '!'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_role={'obj_role', 0x3d, 'vboxnet1/-]$$systemsystemeth0#'}}]}) 20:30:07 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='maps\x00\xeas\xfd&\xd3\xd6\x1btq|\xa7h\xe7\x00\xbcv\xe3\x01\r\x01\x97\xd3^\xd8\xacW\x8a\x9e\xe0\x90\x03Y\x84S\x84') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000580)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x86, 0x3, 0x8}}, 0x14) [ 236.952629] kauditd_printk_skb: 292 callbacks suppressed [ 236.952636] audit: type=1400 audit(1549139407.937:3878): avc: denied { map } for pid=8275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:08 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 237.020717] EXT4-fs: Invalid sb specification: sb=0x0000000000000000H,errors=continue [ 237.073041] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 237.084296] audit: type=1400 audit(1549139407.937:3879): avc: denied { map } for pid=8275 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.133892] audit: type=1400 audit(1549139407.937:3880): avc: denied { map } for pid=8275 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.161608] audit: type=1400 audit(1549139407.967:3881): avc: denied { map } for pid=8273 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.200718] EXT4-fs: Invalid sb specification: sb=0x0000000000000000H,errors=continue [ 237.213773] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 237.225842] SELinux: failed to load policy [ 237.235880] audit: type=1400 audit(1549139408.057:3882): avc: denied { map } for pid=8283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.274344] audit: type=1400 audit(1549139408.057:3883): avc: denied { map } for pid=8286 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.340750] audit: type=1400 audit(1549139408.057:3884): avc: denied { map } for pid=8286 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.393715] audit: type=1400 audit(1549139408.067:3885): avc: denied { map } for pid=8285 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.444540] audit: type=1400 audit(1549139408.067:3886): avc: denied { map } for pid=8285 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.496146] audit: type=1400 audit(1549139408.067:3887): avc: denied { map } for pid=8283 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:10 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = openat$keychord(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r2 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='/dev/loop#\x00', 0xfffffffffffffffd) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x24000084}, 0x2000c045) keyctl$assume_authority(0x10, r2) write$selinux_validatetrans(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x134) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x1f) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/20, 0x14) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) syz_open_procfs(r3, &(0x7f0000000440)='wchan\x00') ioprio_set$pid(0x0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x2000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_pts(r4, 0x80000) r5 = gettid() clone(0x8040000, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x11) wait4(r5, 0x0, 0x4, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/validatetrans\x00', 0x1, 0x0) ptrace$getregset(0x4204, r5, 0x7, &(0x7f00000000c0)={&(0x7f0000000040)=""/118, 0x76}) ptrace$getregs(0xffffffffffffffff, r5, 0x9, &(0x7f0000000540)=""/247) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x1, 0x0, 0x8, "8c13df3fa9583980b7222f38c3a97e1a1d0f1907b79d5ee7a9f5fcf8f6051cb35dbd1a894d83b79573cce363392ad0c70194e2595810deb7b305fc1266234718", "43d8c2d90be10c0ac7274dc2f7eb8b9abb9838a652640a38b118816238d041c0f83bb193b1de03eeab4f8fbd82b350399b1363e5ea0d718bf63afb5319aee15b", "defe39737232ce5a4dba6f680a26afb6947308ec7c694931ce85276be2fb29cc", [0x5, 0x3]}) 20:30:10 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x6, 0x5, 0xffffffffffffffff, 0x0, 0xd96, 0x0, 0x200}, 0x1c) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001800)={0x0, 0x0, 0x0}, &(0x7f0000001840)=0xc) keyctl$chown(0x4, r2, 0x0, r3) 20:30:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:10 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x19b, &(0x7f00000bfff0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000100)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev, 0x7f, 0x0, 0x2, 0x1, 0xee, 0x3f}, 0x20) 20:30:10 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x4000001, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @rand_addr, 0x1}, 0xffffffffffffff0c) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getpgrp(0xffffffffffffffff) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 20:30:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000200)={0x10, 0x0, {0x0, 0x8000, 0x6, {0x1}, {0x2, 0x7}, @const={0x0, {0x100000001, 0x100000001}}}, {0x56, 0x0, 0x8a, {0x6, 0x7fff}, {0x0, 0x7}, @rumble={0x4}}}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/37) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50000070000003f000000000000030000000000000200018000000000000000020000000005000500000068000a00000000008000ff1700000000000000000000000000170000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) memfd_create(0x0, 0x0) 20:30:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x20800) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) lseek(r0, 0x0, 0x10ef6cdc1625dc99) sendfile(r1, r2, 0x0, 0x8000fffffffe) 20:30:10 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x82100, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)={0x80000010}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0xc0c0583b, 0x20000001) write$UHID_SET_REPORT_REPLY(r2, 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffb, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000140)={0x8, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffff7f008ef7b9735d04e71545b67276e6f8385dc03e"], 0x0, 0x0, 0x0}) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{0x3, 0x3, 0xff, 0x2}, 0x0, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x40, 0xac5, 0xff, 0x3}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) fcntl$setown(r2, 0x8, r5) 20:30:10 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x4, 0x0, 0x3}}, 0xe8) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) syz_emit_ethernet(0x83, &(0x7f0000000400)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 20:30:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:10 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000100)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4200, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:30:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast1, @dev={0xac, 0x14, 0x14, 0x21}}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000180)=0x91) getpeername$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10) [ 239.887701] SELinux: failed to load policy 20:30:11 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = openat$keychord(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r2 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='/dev/loop#\x00', 0xfffffffffffffffd) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x24000084}, 0x2000c045) keyctl$assume_authority(0x10, r2) write$selinux_validatetrans(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x134) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x1f) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/20, 0x14) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) syz_open_procfs(r3, &(0x7f0000000440)='wchan\x00') ioprio_set$pid(0x0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x2000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_pts(r4, 0x80000) r5 = gettid() clone(0x8040000, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x11) wait4(r5, 0x0, 0x4, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/validatetrans\x00', 0x1, 0x0) ptrace$getregset(0x4204, r5, 0x7, &(0x7f00000000c0)={&(0x7f0000000040)=""/118, 0x76}) ptrace$getregs(0xffffffffffffffff, r5, 0x9, &(0x7f0000000540)=""/247) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x1, 0x0, 0x8, "8c13df3fa9583980b7222f38c3a97e1a1d0f1907b79d5ee7a9f5fcf8f6051cb35dbd1a894d83b79573cce363392ad0c70194e2595810deb7b305fc1266234718", "43d8c2d90be10c0ac7274dc2f7eb8b9abb9838a652640a38b118816238d041c0f83bb193b1de03eeab4f8fbd82b350399b1363e5ea0d718bf63afb5319aee15b", "defe39737232ce5a4dba6f680a26afb6947308ec7c694931ce85276be2fb29cc", [0x5, 0x3]}) 20:30:11 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in=@empty}}, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000100)={0x6, &(0x7f0000000040)=[{0x66a, 0x0, 0x3, 0x401}, {0x6, 0x6, 0x0, 0x5}, {0x9, 0x8, 0x80000000, 0x1}, {0xff, 0x2, 0xfffffffffffffff9, 0x8001}, {0x7, 0x2, 0x800, 0x7}, {0x200, 0x0, 0x9, 0xffff}]}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20020000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="08fb0000", @ANYRES16=r1, @ANYBLOB="00032dbd7000fbdbdf25090000004c00090008000200040000000800020005000000080001000200000008000200010100000800020009000000080001000400000008000100ffff00000800020009000000080001000900000020000700080001000300000008000200090000000c000400030000000000000004000600500007000c00040005000000000000000c00030000000700000000000c000400030000000000000008000100000100000c000400000000e0ffffff1f0c000400f8ffffffffffffff08000100060000003400090008000100ffff00000800020005000000080002001f000000080001000400000008000100020000000800010013c60000"], 0x108}, 0x1, 0x0, 0x0, 0x4080}, 0xf941c9ed9d49f787) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001300)=@newspdinfo={0x24, 0x24, 0x67a49f9cc7dce973, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8}, @ipv6_hthresh={0x8}]}, 0x24}}, 0x0) pread64(r0, &(0x7f0000000480)=""/198, 0xc6, 0x0) 20:30:11 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x80141042, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffc000/0x4000)=nil) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x23) unshare(0x2000400) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001080)={0x0}, &(0x7f00000010c0)=0xc) ptrace$setopts(0x4206, r2, 0x0, 0x10) readahead(r0, 0x800, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000001100)={0x8, 0x6, 0x5}) 20:30:11 executing program 4: setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000200)='/dev/keychord\x00', 0x101001, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)) sched_yield() futex(&(0x7f0000000000)=0x2, 0x9, 0x10000001, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x4e23, @multicast1}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file0\x00') creat(0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x200, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000400)={0xfcca, 0xf, 0x0, {{0x1}}}, 0xffffff25) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, 0x0, 0x298) r3 = add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="55513c623796893efb17dc4c3009", 0xe, 0xfffffffffffffff9) request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='\'\x00', r3) write$P9_RSTAT(r2, &(0x7f0000000240)={0x49, 0x7d, 0x0, {0x0, 0x42, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0, 0x4, 'GPL\x00', 0x0, '', 0x4, 'GPL\x00', 0x7, 'ppp1em1'}}, 0x49) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) connect(0xffffffffffffffff, &(0x7f0000000480)=@nl=@unspec, 0x80) 20:30:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:11 executing program 0: r0 = socket$inet(0x2, 0x3, 0x4) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt(r0, 0x2, 0x3f, &(0x7f0000000100)="4036f92fac3a9c8f666b88f28415615392c14d34f1f96752e18d884c59f801e56fe149b2fc37366c60b6628332f11523e161dc844e387ac3227ded186f7279c0928e980249f8faf83ee6586260717e61967b82c235", 0x55) getsockname(r0, &(0x7f0000000240)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000040)=0xf3) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={r1, @remote, @remote}, 0xc) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40, 0x0) rt_sigpending(&(0x7f0000000180), 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) sendmsg$nl_generic(r2, &(0x7f0000000b80)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000b40)={&(0x7f0000000480)={0x6ac, 0x3e, 0x200, 0x70bd26, 0x25dfdbfc, {0x19}, [@nested={0xc0, 0x69, [@generic="b0b944f881bb6719b31d62de818c2a015f32a6252fc02c606e7e49f6ce43290086ebf3ee131e22debfb00f9a6d9526a3ca506091b6c2c2d69aa3f6a6969f16fab229c1eccf5c0a6ad7a063c1235cb7edb46fcc7ff78b9a79cdba6ff6a21f333e6231ddb150ef6c98c3bf4531808f54b80bac4d87d8e6e5b13740d913dc975a7223e3ae11fd989d45620b508adff1018d3682ce5ad9b0fdb6b00fee8119d64fc1c6391e375adc9c1640ed3cbf6c5100317747930aa779aac274a3"]}, @generic="3d8da52271d0f435cf432f3f7fe12d7b00776e8f855927287a6637f221e70a72844b0896e64fefae24328712fa5c1c8c8b6280b44a8bb207d68e9136f8d65ac8c4218aee0acee297e49c0c129e115c9fd0f13cea18fd71bd258501d7dcd5940c24ff987bbc564990319e24afbf8a0f4c0f79232f3226907e7a8aaad144c671ee005674d8bb4ac7e4974f4a22f39bf88c068060acaf61f85830126dee0a9279", @generic="937102a746431a0988923c2de9b734adcb40ac29d7aa8fd6c5fa2331c393160bd67b41e67d04ccd403f2e5dbebbcb84746159c72a99e8372579fd56217d86bf4a5a637871b6ea5507585a53f362a9e3106a2b868b65a447aaa190a5e8094bba1c6680e259193c41eac2f86fb563d13e9142f3f7a2af99e00912f5a2ca93bcbdf863f30ecf2a7eaf28338c967a013beea20d2a0bc914cdf6cbb779f3480232893f0989ed20d85c3fc7763cb6cc6e8e698f298b3f02911f7c04b737ed3ee33", @typed={0x8, 0x7a, @pid=r3}, @typed={0x9c, 0x39, @binary="1cb5cd885d94b78e40fc87b8de1a189dd9fdfdbc00beae5fd4c73cddbe23d34043c0311af1a7e2b4c049c68b51e8130510061dc61828d7066f7a7806dc33fb2ce03433b7349a3df6cc6e96760abe9e58babad527dbd39c3fc6a26fa6e98b728ad3b2fa70d7884105a8ee49f8039786748f58a81472b67ea6081e1e2ff49be2555edd94387f69b9a6c6dc3d695e3cdf10e973ad72b696"}, @nested={0xe0, 0x8a, [@typed={0x8, 0x39, @u32=0xfffffffffffff000}, @typed={0x2c, 0x6b, @binary="4a80766380b15af1d8176ee9f5aca9b45fa1d124590a382ca979862f86711a91ec0b03768cba"}, @generic="26f8552600cb54ac4eeeaa0915ef13f3e0328d97eea9f302c0390e7fd4deb3ad995bfeeb9821af8e1fa1f99d6918130f9b8e1dd232808e38e3ddbf63eb088be25693fce0dadaee1ac2a43280aa491762650739c121a261e5f43805a882d91d61b808a5942a3790eb7f0ba6036465ddc419b881773fda3c7cad9faf2e929171a2b7348e10c56342e117780b335fa9d1d0e1711816dd548a7c7c8c3223caabbcb8f998af90b05a5d"]}, @nested={0x2f4, 0x1f, [@typed={0x8, 0x5c, @u32=0xfffffffffffffff8}, @generic="339aca4c7c683cc9f3569035dd9caa6a87effb35ee83380097bc778ee2ff4c9028f96bf31a2548d35d751fa769226ac2a7325ce8930eb60834f35c72eac2185ebd3c3ea5dcb5f815e8291fed8bbbf9de93a0c4f9e7555af7fd", @typed={0x4, 0x67}, @generic="1193167f242f51749b44f978c7ba6338552fb14734ea3608ea20955f8b9435feec5421c975b2fc9ef8b4f44d53475359aedd4e5d2a9c3a7702cf89c404c2cd19f016a86b75fd0c3fc4552d1c8fcbe79bcaa6829cc0738cc1fa955259b4092f1df45519869caceb92501f028bfccbee838616225b393d4d5050b385a1bbdea12e3c9e828c934feae2d393bf691327978c8e590b334c36e151da9f4ee0b61203e2203a7b89aff1e7cac2f573616dbb2351c83b7e29422f4d73", @typed={0x8, 0x28, @fd=r0}, @generic="f771030fcf0289114a1ae3b6b2d3fc3ba2a2d37c4df93826fd6df3e845ddd01f5d79af5c35b5b3fcc9bd92eed6c1a5fa83994a565537a8", @generic="3f03982473e33a56d1a2a93f6bc8a4f603920a79ffd689424db3b3e36e74641797f700d6a03f2263b164a7c4e5fcaec7eaf7589755301764461ead49735312a805fcccf866408c4e6ae302165cf26bc11bb050b7ea49dbbfed5eb12b0727ec962ae9487b39298b9fd196236f2be789be55d832d9ea88b47675a6b2fe6cd6a6dd9d49ba55dbe38765b3b5bbbe63dc81021430d68735152907448c9c64fe3d5e27780e64b137b09cbe16f457cf58f5ec3f5ecdd92ab74283586d7a2a0172321e6633e0b38a5da2d91f44151da6adc7d370034c133d70", @generic="29fda87e933a6ca7f836cdb5fd1a7c03fae7c4ca861088988fc2dd619dbe0eb6ad4a2681321c3892b1e87e0b9f41a5ee203a528a252c94846cfc7b27067230cb7fcb0e9c599110785378b1b1e322404cea7f0f9c767c2b6c4b8b5373c063588021eea24da09bf5c4af14174523102af6f8e6e3a730c9ae0aa6ec16992aaf86685405ad26272cab7d54313075e63cbe7704e6d779e56b6042c5dc307d65703276c066f5ae0461e5751376a1a88ce626ad2b6af406", @typed={0x8, 0x89, @u32=0x4}]}]}, 0x6ac}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x14000100}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, r4, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="97defd891ca5026d1258281d74ac8789"}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x5, 0x11}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x25}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x51380}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x1) syz_emit_ethernet(0x216, &(0x7f00000000c0)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000bc0)=0x100000001) 20:30:11 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x138, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000000000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xd15c}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x27}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="cc0e35b5758d4ce213732b8f2cbbd276"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x401}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x20008004}, 0xc010) symlinkat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000100)='./file0\x00') ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000240)) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb}, 0xffffffffffffff4c) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) rename(&(0x7f00000000c0)='./bus\x00', &(0x7f00000006c0)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r3, 0x0, 0xf, &(0x7f0000000480)='cgroup.threads\x00'}, 0x30) syz_open_procfs(r4, &(0x7f0000000500)='net/tcp\x00') r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="9c000000", @ANYRES16=r5, @ANYBLOB="04002cbd7000fe5bdf250c00000030000100140003007f000001000000000000000000000003000040080001008a00374d2e342d00000800050000000000080004000100000014000200000208000300000008000600070040000c00010008000200670000001800000000000000000000000000000000000800050040000000080006151c280fbf1fbbb16e948d6af29ae8a90e507100c89973f8b97ef1978e95fc278f27847c551ab7945c62cc30632923a76738f00a198cc245f0e383bc240e00000000000000000000000000"], 0x9c}, 0x1, 0x0, 0x0, 0x4004040}, 0x24044095) write(0xffffffffffffffff, 0x0, 0x0) 20:30:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x20000000006, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500ae3ba264f3b9786000002a00000027000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00\x83\xff\x13\x0f_\xb0\x0e][d\x9b\x18r\xd22CT\xb6\xe2wp\xc5\xa6$\x1e\x8d\xef\xd6S>*\xe1&\xbee\\l\x12cI!l0\xbb\x1f\x80\xfb7\x0e\xc0\xd5\xbe\xe7\x82\xafW\x8d\f<\xc1\x8d\x1e\x8b=+6\xfb\xf4\xe4\xba\xb3\xff\xf4\xcb\x94\xb8N\x91j\xc4\x85F\xd3I\xb7\xbb\xf3\x9a\xf2\r\a*\xd1\x9c\x1d\xe0\xdet+\xad\x10\xb2\xba\xb4\x8fa\x96\xe5-o\xec\x94\x17\x98\xceKF5\xb1\xd1\x1ct\xac\x89j\xa0\xb6\xc3>\xb1U$\xeaC\'\xd2\x98\xd1\xb6(\xba\x00B\xa0\xbc,\xaaI\xb9\xe2`QD\xe7\xbcWX\xb5\x89\x8a\ne\x85\xad\xd0\xd0\x1d\x96\x9a\xf9\xc1\xa5\x9b\x9ce %\xd4\xf1U\x03[\xf4\x92\x8d\xaf\xfe\xd3\xdf\x92>\x81\xdf\xd9\xf74\x1ajS\xfc\x1dn\x02\xad~\xdc\xbea\x02C\x1d\n\x04\x049\xda$\t\x8c\xa2\x9f\xf6\r\x9e\xacp\xd2\x8d~\xa4\x97\x88>\xfdW\xf3U\x96\xd9\x18t\xb2\xfd\xee<\x965\x94n\xbc\b\xc9.\xd6\x94ov\x8e\xaf\x05l\xbc\xa6,\x1c\xa59Q\xa9~\xfc\xa7\x1e\xb53\x9aH\xb4\aqh]m\xb6,\xe3\xc52|J\')7\x10n4\xb3;/N\xf6/\x1c\x1c\x87b\xc1\x89\xf4\xc8{\xe8Ab\xe2\x8e\t\v\xe5\xf6\xfcnQ\v?\xaf\xf2\xd9\xc0\x9d<\b\xd4\xf6\xa1\xe0$\xca\xe6\xffX\xe4\xc3\x1c\x03\x93\xf6X\xb7\xad}\x83\xf7\x1a=\xb0\xe3\xc6', 0x400000000001, 0x99, &(0x7f0000000600)=""/153}, 0x48) 20:30:11 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) eventfd(0x47aa) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0xa) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x5, 0x2080) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0xf, 0x10, 0x1, "bb146f45217273a8ca13074edfb254c42f3b46601a0edde2fed1eeaa74c745307a2c5572af129b66179c24f4f32a01d659314ab4b423a0773e73365f81ad4e85", "5eaf2379cc8b46051aecf8052c1a433530687aadfd4d330422ad8948032946398105215e007cde37078fc128e70af593a82352dd0074e0bd90f0581773c658da", "04fd8178d4eac6251b89ac1d670bf26f0cdfe5684a35e5a37963e4c536f64264", [0x78a, 0x9]}) accept$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, &(0x7f00000003c0)=0x1c) 20:30:11 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) clock_gettime(0x0, &(0x7f0000000040)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 20:30:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, &(0x7f0000000200)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000001a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000580)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) 20:30:11 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = openat$keychord(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r2 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='/dev/loop#\x00', 0xfffffffffffffffd) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x24000084}, 0x2000c045) keyctl$assume_authority(0x10, r2) write$selinux_validatetrans(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x134) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x1f) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/20, 0x14) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) syz_open_procfs(r3, &(0x7f0000000440)='wchan\x00') ioprio_set$pid(0x0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x2000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_pts(r4, 0x80000) r5 = gettid() clone(0x8040000, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x11) wait4(r5, 0x0, 0x4, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/validatetrans\x00', 0x1, 0x0) ptrace$getregset(0x4204, r5, 0x7, &(0x7f00000000c0)={&(0x7f0000000040)=""/118, 0x76}) ptrace$getregs(0xffffffffffffffff, r5, 0x9, &(0x7f0000000540)=""/247) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x1, 0x0, 0x8, "8c13df3fa9583980b7222f38c3a97e1a1d0f1907b79d5ee7a9f5fcf8f6051cb35dbd1a894d83b79573cce363392ad0c70194e2595810deb7b305fc1266234718", "43d8c2d90be10c0ac7274dc2f7eb8b9abb9838a652640a38b118816238d041c0f83bb193b1de03eeab4f8fbd82b350399b1363e5ea0d718bf63afb5319aee15b", "defe39737232ce5a4dba6f680a26afb6947308ec7c694931ce85276be2fb29cc", [0x5, 0x3]}) 20:30:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:11 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xb) setgid(r2) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') sched_setaffinity(r1, 0x8, &(0x7f0000000200)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x400000000000) 20:30:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(r0, 0x0, 0x90) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x800) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0x1) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) 20:30:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:12 executing program 2: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="b400000500000000bd000000000000001fa00000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x265, &(0x7f000000cf3d)=""/195}, 0x48) 20:30:12 executing program 4: syz_emit_ethernet(0x0, &(0x7f00000001c0)=ANY=[], 0x0) 20:30:12 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) uname(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) write$selinux_load(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757888b008246abfb0cb0969bbb95a9c56c91de6e1e428be7fed190b4d261e01c3e6094099bd1196ca17222f63c258869155766dd9da395f051ea668ce7fcc3424792b30c603eee6cd406e5718a145b4d19f63ec838d2077aba5009cc0d7894ef75a8e2f1470479b59db4d38fab6f6646bde684106cd5370361a3119e6cf22ae9f6c5b4f7dba6903521f0a09d23995a688b025158533a4f2a3c4b71959becbd63999f1a71c5727ff5d5079fab006772e7d3a19062736612f5eb29216bd9288d1ce56a4fc17b82b487148a4e4729b31986982c66d6965640841912a81bb429a5806d6954fbca94ea12b88b4"], 0xf9) r3 = accept$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xffffffffffffff4f) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = open(0x0, 0x0, 0x0) write$cgroup_type(r4, &(0x7f0000000340)='threaded\x00', 0xa7571fbb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r6, &(0x7f00000000c0)=ANY=[], 0x7fffffff) ioctl$RTC_UIE_OFF(r5, 0x7004) recvfrom(r7, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) [ 242.533131] kauditd_printk_skb: 273 callbacks suppressed [ 242.533136] audit: type=1400 audit(1549139413.517:4161): avc: denied { map } for pid=8483 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x800000000105082) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x7fff) 20:30:15 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000080)=""/92) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x3, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x8000000010006, 0x0, 0x0, 0x50000}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:30:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000fedff8)='./file0\x00', 0x141045, 0x0) fstat(r1, &(0x7f0000000fbc)) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f00005d6000)) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x10001, 0x4, 0x693, 0x8, 0x0, 0xfffffffffffffffc, 0x10, 0x1, 0xfff8000000000000, 0x0, 0xbbb5, 0x100000000, 0x10bc, 0x100000000, 0x3, 0x58, 0xfffffffffffffffb, 0x100000000, 0x40, 0x7, 0xfffffffffffffffe, 0x6, 0x9, 0x0, 0xcb29, 0x6, 0x5, 0x8, 0x4, 0x8, 0x6, 0xd8da, 0x9, 0xfff, 0x3, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xe}, 0x24100, 0x1, 0x7fff00000, 0x4, 0x2, 0xfffffffffffffffe, 0x69d3efbd}, r2, 0xd, 0xffffffffffffff9c, 0x2) 20:30:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xd2c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2125, 0xc0000) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/27) 20:30:15 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) getsockopt$inet6_int(r2, 0x29, 0x50, 0x0, &(0x7f00000000c0)=0x1d) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x0, "d1aac0f6feb83043"}) prctl$PR_CAPBSET_READ(0x17, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x801, 0x0) r5 = dup(r4) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) ftruncate(r7, 0x12007fff) sendfile(r5, r6, 0x0, 0x8000fffffffe) [ 244.064307] audit: type=1400 audit(1549139415.047:4162): avc: denied { create } for pid=8485 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 244.096460] SELinux: failed to load policy 20:30:15 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) close(r0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x800, {{0x2, 0x4e24, @local}}}, 0x88) 20:30:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x19c, r1, 0x0, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x15ff375d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd97}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f6}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc33c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1048}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7b23e0fc}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'lapb0\x00'}}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000000) setresuid(0x0, 0xee01, 0x0) r2 = socket(0xa, 0x100000001, 0x0) ioctl(r2, 0x8936, 0x0) [ 244.149063] audit: type=1400 audit(1549139415.047:4163): avc: denied { map } for pid=8490 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:15 executing program 0: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x80000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) sched_setaffinity(r2, 0xffffffffffffffee, &(0x7f00000003c0)=0x201) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x20080202fc, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000200)=0xffffffff) r3 = getpgrp(0x0) ioctl$TCSBRKP(r0, 0x5425, 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7a7190340f9aa56c, 0x8013, r4, 0x0) capget(&(0x7f00000001c0)={0x20080522, r3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000540)=ANY=[@ANYBLOB="fd743f53ef36ab16d04e10a5df9c6d626c6b5f696f5f7375626d69742c00916824931ddc07e956a356496a5987b282d6bd40a7aa754d4d1d8b03b59fee0e3e11897d6505580bfd4519eecb22ae0f5eab2f4b705f0b2ab8ca45ed4982f83ac6b2d1be87d3e3da672bdbabb229d06d6b0ef6d8a44b6dccd9b3685a5868345186e40d257e64c56c3653d7b2ecf21022697386956002424c0e9db0531c7c03121675e44e2d77d879f361000000"]) socketpair(0x1f, 0x800, 0x100000001, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000300)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000000)='net/protocols\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r7, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r8, 0x80c, 0x70bd25, 0x800025dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 244.218975] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.231430] audit: audit_lost=19 audit_rate_limit=0 audit_backlog_limit=64 [ 244.254988] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.272737] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.277738] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.281293] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.288748] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.303604] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 20:30:15 executing program 2: r0 = socket(0x10, 0x2, 0xc) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000040)=""/113) write(r0, &(0x7f00000001c0)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)=0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000340)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001880)=0x0) stat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() r8 = geteuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000024c0)={0xffffffffffffffff, r1, 0x0, 0x2, &(0x7f0000002480)='%\x00'}, 0x30) fstat(r0, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000002d80)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x812100}, 0xc, &(0x7f0000002d00)=[{&(0x7f0000000280)={0xc0, 0x40, 0x210, 0x70bd25, 0x25dfdbfd, "", [@generic="f3785469194eb7ff3e57f94146019f6770d6ccfec055a3afae64af422be4dd19e960", @typed={0x14, 0x59, @ipv6=@mcast2}, @nested={0x78, 0x66, [@typed={0x14, 0x37, @ipv6=@loopback}, @typed={0x8, 0x4, @str='lo\x00'}, @typed={0x8, 0x50, @pid=r2}, @generic="723760b7992f48347886905c9d2bd17d39517e362b76010d3a65bb5c0645ff409b67e14ad9681414d9691804087d967572f652fb6d686ff26de98ea578793983cb3fcf03490e", @typed={0x8, 0x74, @pid=r3}]}]}, 0xc0}, {&(0x7f0000000380)={0x14ec, 0x1d, 0x6, 0x70bd29, 0x25dfdbfd, "", [@nested={0x10b4, 0x37, [@typed={0xc, 0x71, @u64=0x1}, @generic, @generic="5eb02d02e2cb4321cb10082b", @typed={0x8, 0x1e, @pid=r4}, @generic="ae508727eebfcdb7ddee91ddee800a5b49b5541c88e7dd0e163a55594231bc53a2dfad94d970aa401a228fb38fdb595596be07897537b1380609a6560b32c3b8c3cf00cf05019ddbdaa6199d44d2d8c19ef37916d8817f93fb9ef221a4b06135a4b98a659f03b3bf0c1024819625a3702866c6431705da179a49f288e7629e", @typed={0x8, 0x32, @ipv4=@multicast2}, @typed={0x8, 0x5, @ipv4=@remote}, @generic="b666c9a528eabae8eaf42958980c93235338e196af0866f340451bcd5a3dd882ad2460c91dd414e0479f5a24128484f6902fe12f159c154638495af37599469a62a53bae4c8b3bcdb51587fba62ea2a66e1e086f304b33772172708d5cb900f8486de18ebf440dbfa67704600fd53ed562728aa685eccbc2193e89e553eb080b52cffd8a1fd8e88eebaaa1ca86c31a626edb6b5f9bdaec0ec78cb13c493a66ed7184b993ba12cd78fd4ccdea2720d82c37ef90004aed58aa9a338e90cec125a8b04b408ae8458122ebc12187ca2229b346231e7c8a0f2dcc46d389c846219c1ecdcc297546f8a931c3c9ac7bedb50389f07a4618c9126f0d31898b37d0c167148c2b049d6ef2ad0464d19f0ff94d582bfaedc6813f5732ee61718486f5c4de115da4b717c1260a732da50078d4a03d191e1406aba386e829bab1b75f2c8f1afa698781dd9c7e0b08b422d8006beed3ca66a2743ef75b7fc8d4917acfb3f5e43665f3c74059c0591ecb10a09bf24ffd0d6d11773bfe9cda48f20e6bab3fffeb2e027b438f30b1a7dea5318c33bb35e0ee9b40734477001c5d2f914abf66e99e95ec978b870c0bcaf96d78bab41e147e87b9828ce51e059f8697a6bc266108321ca64727b5c86097b72a498416b7bc80f2608d39d167d7c58c7d347776a4520906c25c5e74d5cd41e91fe8b2365d1f91475ee8efb928d6d303865a87b30562edb4c2f684ed6ed54532c5f4588b06d5c204ef66d11e3bb3c486c503c41925d2ced8bff58cb9a2e4089324062b0fec95c792d16ab5dc99584caee4560cc7bbeca51731b95ef9338be88626fc9e11e277b75be2a0ba7baa02d59ae690728bd14f768a3030489c28b2446abcfee913dc4719386f468a7649bfb39963e6defad8cad2ab32ceda9410137c22e74c327d2fc4f67c5ee4aa582c45f8df27002401cd01d04393d7eec0d0b3cdd173b68cf0ee088f0cb3f407bcd33f82eb6cdd06176d1f0dc7f49b104b292bc446fd9b07cbfba0dd948e30eeaca29422b1f5b42ed701bfc7d2c25d1759aa4f65b1371ffffd39beb477e12ebcf94ec2db0976d124fb71c30d03cb187ba9ccf54fd04f5444afd4dd8f24a453f7cfdbc77fe0665484264c2b7e725030f1ba63bdd5b047e68b8e3b4e8615fcdd7117c9cfb04e66adcf713089b3955ffadffcd443890f7790d2f97cbf76959277d1280ca2981910b2336fd2498b4387e73e286e58073a6b869f6bd8297b7078f7b187f45aa0a5db4184dfd7bb5976dd265e4b9c5433e13f645fb29b15e3f0c038797e1bf83c37d49eac5f0d4abe5f03e0c147d7374eac02ff0090f0a1cb36e50716e61b4f7ba262ed8640e6d23ff5ff7b35617c2c5e4efc0c78f8666b2c7bd86bd60fe70474b654694647cbe7cee010d1bf1e5e4972c8e382e7e90de2ae631336a18f59c6ac944281df65e7d754a00f6db6c80418bb488130854310ef4bc68558fd9aae6b7be6770b7aa6b807fa356ccc08bf2f727ea929eb6a3ce2cd1edf008a025891294953e5bf5d2fe1445548715a5246e40ab9d03718e32c91c2d0127d4eb407d2a746106aff44d75c6974388c166540fd51d45e0e683d3a45944e7baa590679db33decc3d2f9fc53ea7023a6505b0536bfceec5ab065171759e4d2ae09203f7a3e80217384c2c1a9f402d15a91e32ac0a047f633372b08ed6c5a6a000bd5c6c4aacd1353c748ad2e0672cfc662da43f985fb938a04c006388ff0baf3b8af17e2030c6c234da0750c239175f49b300e72264265b0387e7760bc1642dc4bb2aeb6456299ac80784b5ebdd26413a01f6714327981f4bcf72cd6e76e40895172a8908870428268847f3621db63f6196a327c573b279817fd77646969b89665a79ab535224745e57c26cfbaaa0e13c18e3aca7f7da8072e5bc96ee95bc37762e54a009c0132fa25c1454f09ec59c2af9f880fc22789664aeaf19b4eb8e188b83e540077d313bb2938f8a66c3079eac9b136a36b0e426b3c8bedb13c4bcfe18d71c79231c4a55727a7881fa2933ac25c08fd73a2df87aa80a45a8da15d6bf8d7b463e4fa31d8f1567e282d862082d883ee6cac451e63dbcdce063fc5bd7a4f317b5989a3905957a242cd81ee175e8d69ad58ed254120627948da266a629d797c2311bdf5e9bfafaafe6f5c0c921680d86030223b3032b99c9987557b6140c4951e711c1bec9fa0dd11058a0ae6be483cb78a7b667d500349e80ae5f8f988eab38a58b2c392a07e3c8c6a35e1576ac5b2578d7f5c61a07f74640d04faa0db318dea83d73548c1d01524aa36d4236cca42cf758b9c5099560289f24443b654af42893a6ec7808f0a2de556720ae21fae5944315b386275b261dcf715785a20828aef4a4937f04c9e510f8a020680d2e596a1e0184dced826e56a70944ca3bb1fbdac7617f813d6279ece1a2124e4e63d5f2bb448f24012cf752a1271726deb3868eb8c2fea31e246d5ca11e0afe953da9a36b219488feb19ccb95a1766c0c567bd9917977d56b4a5253af2ce393bcd3f6c96f3c205ec1cf6daa3ebdba666a212669f24daff5e840a0249c78dc83b37a39ee9080717bf769460e349857ab5da76e744999d77c2a0adb3cef43e776eee142ac1fc7f052952e8ecb3ed165c2423b678611dd2e1e60e30f7bfb2bad75eb48b50e50eb640c74d7ed731fb91a524acce3ceb6ffe0beed2f1da71b0241fa7bc7e19850581a9ff28a6f7a549bfdbc3887545e409767d8fa85b2e98acb1cf867df200b5b9c9c6e0076aea2a6e736dd9f845cad0a27c1970c8fde82aa97a8096766aaf35ac484f817a1112805968da067dae7bb33c3c1c15fb4bf86dd08eb1fc48a4f9af8ee73e2c9d2ed2c37b4e3c6fdad14c61d8e3ddfdd712c144d90caaa1831160ab0cca7704f135498fc8941ba53494e3c07bfdf3deed6364f2d161fc393f2600c34b79f9533a41c808898d3b427a692ef862ab97711718e73e6537acc93334144031cede983519e68de55ea114e86a473c8ff258c4d8fde75c0fe9b862a4fc16a883590314afaada7f152e2c18135999d2012aa2d0682a9fdcbc0688636cd975c766c67b5bf22cd9e567b91da89270086247c9244a6d652361db3b0736893adcd35355d82dff2cbf3b9d97529ab7fbec948cff0288c01c9f946142a6ca944b15306c4eccb2d6cb77da6efd20d545b8f3d9a473d8ce8ba8066902545ae9a4c6f2bd0e64ae81c86d18ef8358e8d27ec38433e8c6e77acafe2e6cc581df0f4561833c8a16b2a614bc7d31e915b065b140bde6b304de4d3c800363a0ed8901d293b0a8097e3e06ae529d876453dfe761a8018ce325abebaa000bd9f929769f2d149fd101bb3b828ad3d24145dbf86230e0cd3bd7af15834d6a54d95c1e9a6e4444f14b0e85ee65bba3a1c327a6505a850b9b4b8372b7871ea1f491fced5953cbb232a1d928da2964d90de96236bc52da442e1f54ee991c09a5ebce13df280bccbd3204d14cf277335a191088375f3afcf19beaa6353be65ef6ec61f674f6172618d0eb4addb65007975e9b3606674398d136753e682dafa4b14d380e8e94ed535f4e096b5e62f175834d5028de17d35eeaaafc238be456dcf6f5b59142df56d48f893dfdbfa6eee5b5189cd0235bd745104225a893978ba3fce726bc79bc26d050866a2ef286585e4f105cdc8ae3f6a05e46fce41594394296c07e161640188c6b4790741142490a7cc3872835994170797678c4efa902954c28bb4df07d8b83a18bd9f64eb406c896fa1d7d77b3cef338157d48f264cbd910a6833523df9f7085ded6b58cd5e1d8d6ba7e1f383fd3bceabaa54d7099e1324c0773110effff96fe846fee2386ce35e033c12cc4e4006603f9c1f73a01cb751aa618fa309a043713aa1f43b959eb813965f190129d1970cfeae205fdae2e8a97641a91be69d42d1e989d3ba9c41fcc7e96b4e12c27375d5bb185d28fa8d066a8e5288b3014a10e2bce0e420ba9e3738c22935cf3ed9742b114162d0038770b755979ef76fdf0225a40ae7475467e571bd75613ed5ef1efc43a2aedf7c111f064b812b1276498cd930b555182976c966b8653c6fef8ceec109f30576b8c0d3738d989090734eeb2f3a5f09f8795cdcf028e11d0fe563ecc41884eded49be096cbfa9b0af6799652b3d02efb76f9032e76a80ae7050b41378202c1fc61687fe1e4b0a3a785c75ce85ccbbc5078f314c5149d5d4f197130e0542a6c0f03b6c4288ac98fefb7233855675ef847d5afcd6f26ddddbf5a8b2f1fc25f3d91fb40688d85cb62eef97668cba361b40ae01712f78880d6415e1144185b2dfd7bc4b5cdc5a84cba841927e3f49f5092d2c506dc3a7fb96d5fda6b01a29a1674437df208da5ffe1908430b13a023ac6ee3e360300e6a008f8056ca86c168df7f16a214fb2fa453d5d4b8caa2412ddda57940f946953db4e0f0d90ac383688f3ed145d974538c2127a6a655dd4e655e9ce00e5a61b25fc5b9bc54ee89fef5194e94270339bab6393a8b8d15268f42aba741552cfa3fb728c725eeed29e4a9a0c4349fb04ba9fee4be21272d97ac8f1286d34eaa72fcb56bd8d940d737c66ed590ac098b8860eddfdb5dbc94f4d27c2e20bac31a7f5b12a836f7a37626606ae497faaca178ee15ba12f19eea0ba4ee9914ca67dd194f37f3daab1ecd33537658af2494c1596f0efb91d5415da832acbb1c10f292fbbdf979697f78199df7fe5157cce4908be6e088b3adf9ee92155cb96a2d9d69833240518e3ba55c7bd39b05b26c9201ead77274a24dea2af7a56a060b18dab1e169b65945020be017fe02b3a03522215fef8a563011057a18ff4176d14a8b395cf0761f7e2b943d989e628b8bad287565e70bd9a520aa4500e43f939dc3ea956a55920c4d17da8ef4fac97d89af12672d5ef7c9e9fe8a87babcffff0256dbfc46b73042abbd29f609a84bbf79e26f5bd1abc64e74d01e2f8a2b6c6f652831c75a9aeeffa0c9a3eb61365acb0cf546a3a14b55bda33d7149d8ea4099e01ee3bfcfef861091180cd0219db7a0857632e7cf0dffebab60626bb5901f32b92817a9867dfc6c3abb56723e0c6d08ca1fd7c6bb7677796910a2a07ef556f6993d6ca20fa2c4be480e2918fe64748a4b556df5e7090db33077a20e282f454f109273a4f9735858c5f05f3e4342d35771dfde988789b660ed5e29efe4a74e9596653bfe6bdf98f7b60a8c172cb305c5ba5f3c8403bcee9f27b126a7edcc4ad16f6f0d6883cfe79b59fbfb311669c3beba3fd8d5c50eb967d0f5d27cd022c86ef6daa8590c6b03d8bab3095e0b134c3ed05830404fd2d867f9420307447f06d8af783cd10e31617ffac9cea81e7f44bb038c2b7b8200c4198b3deeda7ab3e2020c522230d358742cd3822a9b3e729b04de7fdf3f69cec44441b845947ca0b04e83d410a5d47469d8c4ec37aa221465bfdec2b3a01a744dc7b9f7404b44ba3a8dc38d2a5711de1ebe710c96c900e9e9fee145ded580155cd7bfd6e834cddcfd8944b33287452f0ce85e4f44e551ae87f473a563dd14086efa2e075df760e00def787472da4671031fe05577c7e7d30896527b05b7d54c684c95aff92e3c796c6fe347b8bfc6540e7ccacd1da28b78d1fd4e0160e830064499d94426e2d6706fdec784f1ba4f7b67fe69dce5fa7ad2e66894190bf83896c133f9c03d124d5c9a1d795b818d40c5f246839d8fab95b6fa8275c7fd92b81a0b16a0951ecf9c5e12d27efe2195d1140d113155ccd3d544217ba11ec95f8fcb225e1b6e19d5482e7"]}, @generic="a6c25e6aa017ff17bbe4f4cb8602a20e32ff241aab2deb8e30bc1d59e83cad8109a0e4af973fe916de2a181af7537831a30cb92679bb1ebe2567fa35173ca0dc505aec50635edffcca709c2758d830f77ab0185451aa848c0aafa7570d1311c9b5efa4b0064a9a574799c03cdf8c7ff404b3e40cdfa6c308305e6cd3ec991c3bf1d056aaa0aa04aceb8e782a103b7c5514d9fc8c4073ee47cdb35c1c0c7e29fc1b66a5b985f0a9a38726a35b9d7e1aea62d7943f5ec454c93ccd", @generic="87cddd00767d7c19e774e85d769c55312446cb5ef953a3f652a07ba456d67d09869e183307162afb555129bd63539500ccd1257c3e6948a8bee0713d29d06ada328564977d5ba93a3dd1114cc24f8946d41e58bfaabf8bf020ac20472f2ce53910fa26dc43e23b31abda8779b2a312a498757038c1c1f1f12ff3c70486d5563a18199a54b142416946f44067d84e23e564239ed047f6d9", @nested={0x178, 0x13, [@generic="5ff1def94806add1edb20bff3c03b696e98d82ea0f5cfce463e5bcc5519975d0c6f7c6b78d75c06d0a72daae7a2949d1ac781ca87330376c4803a487af7e882cec5ac658e39522cd449c53b97f39eca62ca928d01e83fe34a43995066117073fa5715cc9ab45ba4adaa5fcae7d397ecb4301e241737a403d321b3058c1565a5e938ac2fe7155cc0e649ddd66b427b6087a7499e99398ebcb5a92ed44204121361fc78f5cafd0e4d6ffd1647315241a06c7bc79dad5e37097182a1d69d77194b71fb05959841a018a9b8d616d790007c582ed9cb42c7472788440cb87588995d301c204454f9541da186ef529052f4daef5674afdd6ddbb", @typed={0x8, 0x75, @str='\x00'}, @generic="484adec1aace4f477127f2a38ddc6c2a042406ba29608c09dde8662d287698c9397417dbb65ded685e539c49821684dcf46ff58447", @typed={0xc, 0x2d, @u64=0x6}, @generic="9c015f97dc7e97df5262923c7adb58ad1c6e6edd9cad77438018b7433b1431b8890a14fc131e4c3565f90ab18e3774c238a04d"]}, @generic="ed068f2d02f36b4d6e97866c9b53e79f07790acb25b2e91ae2c6d9821acc708d6a1d3c71b93c4669d9add8a7f8d56095e41b58987c7b006d869e41748ca1971faf3161374b7fc5c93c71e8c7d0c437ad7150d4fddbf07e93222b7aa0811732c0d83ec57290c808795111f0", @generic="de7bc0a375837866abb54af359c0838bf7e833395c49982c45a10a5c13df7520baa2b79cb40765742f18d2a4f52b8a5463234e6864e5dda836ab539ed1c5ca9ed9575d1b3e9c4f0fcb51f3cff84219a19505907756ebb44393dbe96bb18746caee2fdc85bb6e8520748b0535a59fd957f6ce5c9028591064292de658ea202505c62a306152dc159ca620d0f60a2380e5c30be403c2daba77bc0012233c61ea1f3ba188967abf646e3c6ef2f54704f5c83f42665f5ca0eef3f7856e9b45126ec1f919b53b3bbf70eee07ffee00ff0ae377bd2f2adc79e53c756a66a351c7bf357e49802f1a4dc7889b2e1fa95323f222f58c170"]}, 0x14ec}, {&(0x7f0000001980)={0x40c, 0x1c, 0x2, 0x70bd2d, 0x25dfdbfd, "", [@generic="5246684f657c1abe087edb8953b3610d0e3fba2f446fbf743385732c", @nested={0xf4, 0x7a, [@generic="3f1df5334fd750c00394d858552d7677dbf75b5b9da09b5ca36bd3de2a2739461dd5288fc896fc508e4d34a71079d196083511b6f861dfc49bbb04b964e11e59547d17c6cbfb84abc9bb2d7e171e538d7361c8098b33efa1c82a8c512c785c7ebd5f69771d2f452268e0b74ab0fb0314c9221177845346f9a0", @typed={0x8, 0x72, @pid=r5}, @typed={0x64, 0x46, @binary="3553f302ab02113887eb24edc255c70757a7d150e1fecb69a2d66a0a1cc3d29e911ea7d0e3d620798002ce920acf603a7a3ce7dbb40437e24a0bfb6ec716fcc396338b9aa4c4fc47403d2a078762f7c163b5cfc268bdeb1b5c33942072"}, @typed={0x8, 0x16, @u32=0x7f}]}, @nested={0x2ec, 0x44, [@typed={0x8, 0x2a, @uid=r6}, @generic="603fd126e33a8ae0722da0de58b386b0c935add8e561ecb184", @generic="aa31719a197c79a22079e97cb3c24e80076c29ef49ec0faf98d5b4c271f25e382c66e2e3910bdf657a9c1c7d6c2c76ff790a0c23bfbd795495fade8be46ec55169db65b330ccb40e8e7e004e3892482ed1ff93a0a3684a12d2520695b5a81eab2fbab7359fd2b011688fa9ccd30743ab6c09b0ce3acbca3162480ce210efa504c08946bd4b68195183150c51c816c085f796d24c35bf961a2bdad23a72d3285c79bc67e1cc37ff55a3797a24c2dc5730eb61835954a588020996180f272138d726ec040bacf4899fbce37160f31613e85f34a26c4a217cf9d9e615a3f3bcc99536289e0c6a7160e4", @typed={0x8, 0x5e, @fd=r0}, @generic="7d91188e339f07fa30351ebae2073a12d644ed9215a65c70f8622f5bd671dc962a9d48ab", @generic="f6f2e044b3574379af4d81e807ed032b394ce9b993ca077e3f3476b343a4c356c489029f8f41a108744e0aadfba574af22eda3d708613d4578cb88b9c7f2601fa88c0f60f49dfa174c6c237790ea705a232909e6b4bbeea6d668fc3d629508064a9167ac228938f6f0a3ac817c124410f6da12b77b44dd8db6eb7177dd474868f4580e6821cadca96eee8285f793a9226dfddedd4d842cd73f018af3584f7c8b5c4ac87b1dae", @typed={0x8, 0x8e, @fd=r1}, @generic="a3e242afd7aa3e1230709fba92d97418e17a690302a7c55e63d58deb4c853ec8c403fe3e9ad000a5ec7e7844c0437651e3a18cbe5aa0883361daf7f08b225663ca3e2c8c0a1fd51b9fac120e273c1835667906b0229666399a083293bd8fead27f511a67f20835c3a68968bd81b3a12b7708cde367bd105a5aedcd85368364685a5316f16b3e2226ef0ee857f8ddcdd54e0979fc56c1f16ea932b06f13e2f70d17cc1e8c44045c1bbb4d44ade14c8262364d979e7fb2b5cd77d97f127432c190e0b72eadf8b369f7417b5a9e297ebc2c7b92e1f80d5a6bfa00f6de9680fb3c86df67b56b8011b90055d7fe295eca8ca80e9704baccaaf0", @typed={0xc, 0x63, @u64=0x1}]}]}, 0x40c}, {&(0x7f0000001dc0)={0x1e4, 0x31, 0x0, 0x70bd26, 0x25dfdbfb, "", [@nested={0xcc, 0x86, [@generic="5d20ae9b42816ae00ad1d0564865f89c079c9aa73d4524e61200298a3cf8f20718ac5b2e8ab7433738fea975d8831e72023e5000949b1c73fb43135f13811dd5877a587f09a7f027d264691997264d63f3966c3b31d26bab08e54f28e98d8cd47f66b983223d5a510341830fb805b544c7f13ffc31247a5592815f3a19b9bc576506c23cc16f0f983c91854423a95070e72e353bf6005415ddb32869111c9dd5d7fe3560202158372246bd17f3e7f009c016229334ddd02670d9e224c1f356fd3e0c0a9c7b7c61"]}, @generic="3530903f48584c88d4735dc985ab9034a62d76888b0766e1fa4c18bebdc46d94c2ac5ac1e76fc481e5d54afc0ab6b7e6b03a6ddd8ee5e6dbb7021cdb55f7242744c3d81ce7c9355bff8be8c7ae421f0c5cc4ae98e284f9516515c4ecfc6f47bf4d83dd278ed77fe3a4fe10cd661ae17611dae5783db14c7757327bfd9e1f1bc0a17734a16c6a5bc5421d8207e68af8d20955970f6b0da66ae850ddbe91c54b9018b003e07e17f7d6ca83c14fca6470d95d22bcca14dc81e026a67638d59cecf9bbfa424b4d7ae64fd9418edbd701a171552cce8b66d2238959ad44c3e4bcd2ee0e8356dea1d3583b668fb336", @typed={0x8, 0x5a, @uid=r7}, @typed={0x14, 0x74, @ipv6=@remote}]}, 0x1e4}, {&(0x7f0000001fc0)={0x460, 0x15, 0x101, 0x70bd2a, 0x25dfdbfb, "", [@nested={0x1fc, 0x82, [@generic="d78c0428b46011ee81ad61682bf4181022e0b1314b730ee02362976ad146d509de27999bd6464694c2030d23ec817aec0f1f5047b0b432189947999a9369ed86729dfc263cf534aa9eb15c2c39cd6159a406a720626ac15ae77168aac9b3d7e259a02bb5dc69ca8b0961859fede8f05cc92852bb90ab72aa", @generic="9602a4a4c6741b55a9f5e796c45304543b058602631a4f35a5db3d161bd1e1ba4193abd0e000", @generic="6021d5f43fcee2e97e02a9650a8bec521bee5a6890c48b80b06eeca22217f711e3b3213a11be89cd0e881705f95426b2db2006da278a1d9517046ca8489c614614cac770a273da917832453756582b99ce46d458db0ae00b150946b886af133aa4cb72fd6f8992fd5d7e8efd36ef7feb18be20281115e23e385165f2", @typed={0x18, 0x76, @binary="cc9efec13e0eb8d9e42f93ce683561d7a89711af"}, @typed={0x8, 0x12, @ipv4=@dev={0xac, 0x14, 0x14, 0x28}}, @generic="0eacbab58f73fc5837ef84470adf7385af48509c12ea8e43ffc0d8ff261c78489ca69e258a95494c4d3007fdb98dd7ea9e15a5c40f56d5129271ec6313f8f97c37cd677969521421a11f687975f535ade38c8a8e72035db8e0b2c69182778d70e8ca7c9b365d51eacf09fa7b6f6023fcbe2994c451e1a24a1176ba7dbbd31ad78ffbabf7059580d89773f8f0631b10f0c6b8a1e700ce01556bb3f1656442dfad938eb0174ae401b6687ad3b78c8227b700a1695db2884fa3efd2dc35c609"]}, @generic="7824ae64ff3dc81021f4d26ae3155b2900a6ae1481b29018603ac83a7f9f1507f128e9350d28771e716e11ca2e8c8ec60ed462b873f6553fadf557b1b1448c74d2f34385eeeaa7c40fcfae0e4c46ac1e1f9a3b62f0dc274d4f00a627bc10bff9be2973feaa555f89d4cab626c0b84f8ee23a612997b836cdc71c171d09d5889ed12d3e0ca9f1697b80f75e00101f36726b77052bc57e4eef02790d801c169718a4e67200daad266bb8952032ad2d69d9b35686fcbbfc3ed2c066c3a4c11cb3a831d3d5d57777a4efb53c2f99107c10bf25bffefc59d0855f9ad613", @generic="ec2eddd372c8bb0f94013c93f2be33be3fcf6982f0e62ccd80b811e0de4279d543a65a0af9223e08ff12dc74fe4dbd1ae9a6fcb2356cedcd4b502727ee279096f17b30dbcd393217c995850882649bc5b3dfcf62ca5c109fa1a963a9c56af6c85bd49a67af6d987e0c5e86657b07c5ebe957e7d063cd17eb4825520d069d8d385e6a3f47ac51452f1578b341f3eec9619808abd91433dcbe21fd879608c5df9a9c7e21b0a3968a6f60cdde76b055b3e2a841b9e440246c0149c05202407cf8ce2d", @typed={0x8, 0x69, @u32=0x6}, @typed={0x8, 0x76, @u32=0xfc}, @typed={0xc, 0x27, @str='em0)lo\x00'}, @nested={0x9c, 0x3b, [@typed={0x8, 0x33, @ipv4=@local}, @generic="72a5c7144b087446a578b96c45762673f047c8cd16694ca3a70a4c04b94d37169c89b38d4f3f6576936c3a1e5bdac4881a75cd5a2fd16895aae451f4b7cbedc665be49188a0938815da91c17db9c3b88837c87eb6dc54349594190e6acaf5dc6071b7d1b364891adc9fc3ef81a37bc3b6ede3bbc2c850db7c6617c", @typed={0x14, 0x5a, @ipv6=@ipv4={[], [], @empty}}]}]}, 0x460}, {&(0x7f0000002440)={0x10, 0x25, 0x208, 0x70bd25, 0x25dfdbfb}, 0x10}, {&(0x7f0000002580)={0x760, 0x38, 0x20, 0x70bd25, 0x25dfdbfb, "", [@generic="ed4c7d6984f8554f6b053e1a7140fcb39b8309dc40a3b1eea781b1fade7cf5fa84ad4ad90378d37bd5118bf1da2826044a8cf68c028c1c1405890d39196047c8ff1f552ccbeecf5f6a741ed494681e0c5e495f2b6c20244ddfa8dce9ffc397b67d5b60d201754a76e85cf07731105c191ec53f10f4d2526878cfb2fdf4404d7855d0a44ff0119b7326ff955d5823cb24b03b7c8fe097acd08abf1079a9a0848318c2c480", @typed={0x8, 0x49, @uid=r8}, @generic="5840bc4d4b533909e9a0f75dc314b101223056312390084c0880a4", @typed={0x8, 0x70, @pid=r9}, @generic="3f35733e3ded4d82983e4b98ca811a57391866969e9ec5220f2d9429bac9276bc81e4732093ba194bc465d1e0f1c62d3ec2f18bac0bd169178a65eed6f8ee73449b3883c478e0bcf46047137b16e8d66d5578c4eb6122f74ab2d405ca6f30c859ddebea2c1880ae4ecc78b5888fb3dd13423609826aab961c5f53541ee477d93e5c31a0fc9adbc17e36cbb233b9f5b5c7e53e8022586cd0156", @typed={0x6c, 0x8b, @binary="cd6a709c69a7c206060a9c17528d27e3f6442c8d64c77dce04ef196733a64a9ac426b1408e426112dfe15b321ba6830b717f4adbafb7cc7defe995157b3c1a12848add4d81a9167a6316c849f2b8ebfb246192824e1e99ab4ee7c9187a5b737a9504c9a981f3"}, @nested={0x194, 0x6a, [@typed={0x8, 0x4b, @u32=0x1}, @generic="2781201bf057bd9f6fe07b9ac3a59619091eeddb6d416b703f6659c878f1122c773dcb2ac704fc6e96420deab09ee0ce624a7b01db66c08152bf66589cdb7ab61cc12896c455fc42778bdbf82fe2be3ca668f6a3cbfc3ae9e453e61e3e151ba43d0f10ce39b9c2c352a471b4f438efb206a3daf8bdaf58b361e58c8d01626c4fcd20aca83bbb70", @typed={0x8, 0x59, @ipv4=@multicast2}, @typed={0x8, 0x81, @uid=r10}, @generic="7557abd85af6de4576809e36346448592ae4189ac359ead41a80ffa8de19620f95abd8943edda83a18ca1189ae2633a0885a6b628b7fa77a5546ceec73272c67e314d5ba23976a58edb0b90e867b6a8b50cbb4fb89644203d7f9c6d5a32c2c9339515c8ae700f6ecb9bcfe437e9c8a0a3c5eb17adcded7d8410be9cc8d03696e7fa28bcccff2bf6f7250cd1bc89a95adccb64c289eeb6366a19613cc5d8018ba6a25fcf73ba19cc64a5651508e7d670a96d20d016a8353f8edc614b2e85f0dd5146ba1defc2cad1de46dfe3ec7a1f60d062cadfc8244bef8", @typed={0x18, 0x42, @binary="91e1fafa60084e2fc8f5fed541d983315569c690"}]}, @typed={0xe0, 0x7, @binary="72b6bd2f251070ab609b8f677486170ec1b231a4dad590c0c7ad12e63d20915a40508a4da0ab6a277bfda88c3e61a84e45a4bf8d1790b8c34bf315814f58d0ac34df1cc49df16240949a8a5e707e4a49abe72f12ccee67d69ca6f64fbf6c09af1eb38fc543c48dc2410e756b6f0f71de446d63d279a79465d3fdf449ac9e3d70592660a5941b75cd82e8db150562d4bb69f1657d07c9069f0d28be56107344ff487b74160fa2bf96d90ea8037d49c2c91de66546a80e2dec47853096b298848d72e6c933551e599e732fdce493f028a3eae80e34023b3638391af1dd"}, @nested={0x24c, 0xe, [@generic="8f7eef110eb7becbaea32290255e4b713f80dace70bc426efbd2bc33115158f8054f6f2be3a37ddce2eb8285f6e9e7d3c350d250849f63391eb19babee533289f1a6543b1448a9705e7becf8c609100c62a9b2c051d6c33b71084139d37041e3a208402fa26cca0491342216e6b7b56c3bb6ec4663b9675c90bf2c8665463137c10080be90121956ddca9eb238a35d279d57ece709a94db7acf60f7eed809fdb35ed2e6956d52c46b8c5a0f4", @generic="48dcb096be95399dcc2da819aa7403833391efd8dcb9e075b648d741414aba3bce52cf2a6b32ea7e40af83d9e4a9c545983729a537ab72916f5ccf7dcf95c15988c71e16baa9b485b097163bb629fd9dd1e404f066197b3740b8489f87d94df88367faa3eb094a585b91f8f974e0b3dbb27cd653e7d0db409566e898d1e6f9b065ce19bb100adfcf2bf9c65980c4be8adee1ca7d804c07e3223129c6ad551990f112a919308029da8b6a58dcf547f5d1060b37eb8c44822b2d0202", @typed={0xe0, 0x85, @binary="11a67647f2513cf62861cdd74654bae9d0751d42f1d0603bd6f2fe6f1366fbb1a473972d55ec52e30e84a29a0079266b529bfd51b69c967d3962262803afb8aea5d87a97e264913d7bfcdd773bf42e1384e67814d82b76626b59d037e5289c26e925d4fb6607850f47fe0f614496da415c5c841de6ac5e515aab6c351defe34ab002c8822f2363b137260aaff92cbf0c894119887cb8bef3033cde0cc247768dc0378933bcb6967b0d8e5d75a3a769530c2179775e3f1deee1c7f90106ea9a6860cd074db1cc2705524fd9fdf69fa3fb077316e1d48e83fff4c2"}]}, @generic="5acc29598a2ba536b725bfc6206f02bb27e73ff4892e8de9015492671187e5065b4886f026ffbe355ee7afda968edadc90700fb6f392f9cde83b24caecb19f28cbf31e22ee27b9eddf2493c5c79853ab28afa52102ee84261cf562ef712e555a514feaa6c3a33e8a8a0dd860dc6b6658a61c82b3360d9dadc81c47aab7b3c9bd9eae967014a5a49a3e71a7992d5a50f5763bb57cc7ef72ad9eaae236e455fc494e4027f90953949cd32dfd2c8f999a9e73c5109068c769777c3c1f"]}, 0x760}], 0x7, 0x0, 0x0, 0x800}, 0x40085) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x3, 0x2, 0x3, 0x1, 0x8001, 0xfffffffffffffffb}, 0x20) write(r0, &(0x7f0000000200)="1f0000000104fffff13b54c007110009f30501000b00024000002001000060", 0x1f) 20:30:15 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0xb2, 0x1ff, 0x8, 0x6c1b}]}) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") pipe(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 20:30:15 executing program 5: perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1b7) r1 = socket(0x5, 0x80000, 0x6) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000380)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x3) write$binfmt_aout(r4, &(0x7f0000001400)=ANY=[@ANYBLOB="0801200303010000b3020000f20e0000030100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f24c41470000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4b3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x2, [{}, {}]}, 0x48) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x40000005e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000100), &(0x7f00000000c0)=0xffffffffffffff38) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(0x0, 0x0, 0x82) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x6) socket(0x10, 0x3, 0xa) [ 244.624072] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 244.708613] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 244.946897] EXT4-fs (sda1): Unrecognized mount option "ýt?Sï6«ÐN¥ßœmblk_io_submit" or missing value 20:30:18 executing program 4: futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000100), 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:30:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40, 0x60) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="6368616e67656853eba8108a4d3030300861d5d6046a11d2ed"], 0x1d) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@hopopts={0x0, 0x2, [], [@hao={0xc9, 0x10, @rand_addr="e9df8b05808b98c56c34000c7ecbb923"}]}, 0x20) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="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", 0x565}], 0x1) 20:30:18 executing program 0: symlink(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000008c0), 0x24, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 20:30:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000), 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) getegid() r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001600)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0xde4d, 0x0, 0x0, 0x1, 0x7, 0x0, 0x7, 0x0, 0x6512dd2a, 0xfffffffffffffffd, 0x3, 0x10001, 0x7ec5, 0x0, 0x9, 0xffffffffffff9a6a, 0x0, 0x0, 0x4, 0x60000000, 0x4b95, 0x5e, 0x2, 0x0, 0xfffffffffffff000, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x20, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x0, 0xd8}, 0x0, 0xf, r3, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffd, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000180)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x1}, 0xfffffffffffffd87) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000001300)=ANY=[], 0x0) recvmsg(r4, &(0x7f00000004c0)={&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)=""/182, 0xb6}, {&(0x7f00000001c0)=""/27, 0x1b}], 0x2, &(0x7f0000000440)=""/118, 0x76}, 0x10000) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'teql0\x00', r5}) sendmmsg(r4, &(0x7f0000000240), 0x5c3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000240)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in=@multicast2, 0x4e21, 0x3, 0x4e20, 0x50e62cd1, 0x2, 0x80, 0x80, 0x3d, 0x0, r6}, {0x23b, 0x14000000000, 0xfffffffffffffff9, 0x40, 0xb810, 0x1, 0x3, 0xf76}, {0x21dd0000000, 0x8, 0x6, 0x8b}, 0xa7, 0x6e6bbc, 0x2, 0x0, 0x2}, {{@in6=@rand_addr="222b3529f99e07e304034db8971bf842", 0x4d3, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3500, 0x2, 0x3, 0x4, 0x5, 0x80, 0x100000001}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000059d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 20:30:18 executing program 5: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x2) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in=@remote}}}, &(0x7f00000004c0)=0xe8) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) splice(r4, &(0x7f0000000000), r0, &(0x7f0000000040), 0x0, 0x4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r4, 0x0) write$P9_RSTATu(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0xfffffc1d}]) setsockopt$inet_udp_int(r3, 0x11, 0xb, &(0x7f0000000080)=0x6, 0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x80) 20:30:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10080, 0x0) getsockname$netlink(r0, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x20, 0x80000001, 0x6, 0x2, 0x0, 0x6, 0x24, 0x5, 0x40, 0xd27, 0x8, 0x7, 0x297, 0x4, 0xe67, 0x79a, 0x0, 0x3, 0x8f8, 0x7ff, 0xa9, 0xcfe, 0x1, 0x9, 0x20, 0x7fffffff, 0x1ff, 0x4, 0x80000001, 0xfffffffffffffe59, 0x6, 0x0, 0x80000000, 0x3, 0x10000, 0x6, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x20, 0xa02, 0x2, 0x4, 0x3f, 0x5, 0x38000000}, 0x0, 0x8, r0, 0x8) r2 = socket(0x40000000002, 0x3, 0x80000000002) ioctl$TIOCEXCL(r0, 0x540c) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000040)=0x9, 0x4) prctl$PR_SVE_SET_VL(0x32, 0x1131f) setsockopt$inet_int(r2, 0x0, 0x4, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000200), &(0x7f0000000240)) sendto$unix(r2, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x6e) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x48100, 0x28) 20:30:18 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}], 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10) 20:30:18 executing program 0: preadv(0xffffffffffffffff, 0x0, 0xfffffeca, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@initdev, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) creat(0x0, 0x0) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) times(&(0x7f0000000000)) 20:30:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000), 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 247.300388] raw_sendmsg: syz-executor4 forgot to set AF_INET. Fix it! 20:30:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6ca195c39b65543da267dcef390e00000701002936498403ee010000002280586d608eba034d97036aa484f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764592db6811b60f40c00c4734925d598d3181aef5f820008d3ed46c336a5e70600000000000000914e0000000002000000000000153748644a72f5c6844800e2e76137351a58800432e311a9aad847de2cdfba120a4fc4480003"], 0xa1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f00000004c0)={0xa0, 0x19, 0x2, {0xa, {0x0, 0x3, 0x1}, 0x63, r3, r4, 0xd5, 0x0, 0x0, 0x400, 0x46, 0x5, 0x5, 0x8, 0x7ff, 0x1, 0x1, 0x7fff, 0x1ff, 0x8, 0xcfab}}, 0xa0) ioctl$RTC_AIE_OFF(r1, 0x7002) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RSTATFS(r5, &(0x7f0000000580)={0x43, 0x9, 0x2, {0x3, 0xffff, 0x6, 0x4, 0x8, 0x4000000000000, 0x8, 0x4, 0x7fffffff}}, 0x43) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) unshare(0x40000200) 20:30:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000), 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:18 executing program 2: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000200)='vcan0\x00') write(r1, &(0x7f00000001c0), 0xffffffea) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$PPPIOCGDEBUG(r1, 0x80047441, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000001c0)={0x7, 0x1, 0x100000000}) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000240)=0x8f2) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000180)={0x0, @speck128, 0x1, "5418ed6642f9b485"}) [ 247.547398] kauditd_printk_skb: 17022 callbacks suppressed [ 247.547406] audit: type=1400 audit(1549139418.527:21148): avc: denied { map } for pid=8617 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 247.601647] SELinux: failed to load policy [ 247.644742] audit: type=1400 audit(1549139418.547:21149): avc: denied { map } for pid=8619 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 247.709439] audit: type=1400 audit(1549139418.547:21150): avc: denied { map } for pid=8619 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 247.762733] audit: type=1400 audit(1549139418.557:21151): avc: denied { map } for pid=8617 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 247.800137] audit: type=1400 audit(1549139418.567:21152): avc: denied { map } for pid=8617 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 247.842933] audit: type=1400 audit(1549139418.577:21153): avc: denied { map } for pid=8617 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 247.915359] audit: type=1400 audit(1549139418.577:21154): avc: denied { map } for pid=8617 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 247.971930] SELinux: failed to load policy [ 247.974797] audit: type=1400 audit(1549139418.587:21155): avc: denied { map } for pid=8617 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x3, 0x7fff, 0x8000000001}, 0x2c) ioctl$FICLONE(r0, 0x40049409, r0) r1 = gettid() r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x244302, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000140)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r0, @ANYBLOB="cf027ba385d0c24dc4139cea9181aa4943d2f4e0fbbef585c121bc3084619e00be57c7b19bdcd3a159ff868d380c50f310c1a4cdfc55bd70a9041052ea3a3074164305ed3f9f7b74a5b738b931875c4d8878", @ANYRESOCT=r2, @ANYRES32=r1, @ANYBLOB="75eef4c4acd4e2eb794570eb2d2627bf93120e7daf9738677325ff65d5869f619b2cf005"]}) socket$nl_netfilter(0x10, 0x3, 0xc) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) ioctl$KIOCSOUND(r2, 0x4b2f, 0x2) getpid() bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x0, r0}, 0x2c) 20:30:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400080, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x40, 0x142) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_WAITACTIVE(r2, 0x5607) poll(&(0x7f0000000300)=[{r2}], 0x1, 0xc7) [ 248.111450] audit: type=1400 audit(1549139418.597:21156): avc: denied { map } for pid=8617 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 248.231898] audit: type=1400 audit(1549139418.597:21157): avc: denied { map } for pid=8617 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:19 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r1 = getpgrp(r0) ioprio_set$pid(0x2, r1, 0x0) 20:30:19 executing program 0: syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x80) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x24000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) write$ppp(r2, &(0x7f0000000000)="bffb8d02ff584b0d79e032f206e2a2d4895103d8d57282fc0a70319176ffe595cbaf9fd743b8983a0cea896618fcae318423199a9eabff447626c1108e528bbc698b395440c218b6ce838d3973351408f4d17db4cb76a077d9e584b03207039a4353af80e43108630e2167200fbdace7b8cb1a5d7a035d69464252de5ac253d707292487821cb35f41", 0x89) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r3, 0x0, 0x1) 20:30:19 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x2000000000ffd) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', '\x00'}, &(0x7f0000000080)='user.syz\x00', 0x9, 0x3) lsetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)=@known='user.syz\x00', 0x0, 0x0) 20:30:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:19 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') r1 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x3ef11623d986b399) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'syzkaller0\x00', 0x1}) ioctl$FS_IOC_GETFLAGS(r0, 0xb702, 0x0) 20:30:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x2, r2, 0x1, 0x9928, 0x6, @dev={[], 0x25}}, 0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000740)={r2, 0x1, 0x6, @local}, 0x10) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0), 0x4) 20:30:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) set_thread_area(&(0x7f00000000c0)={0x8001, 0x20000800, 0x0, 0x0, 0x10000, 0x4dde, 0x6, 0x5, 0x7ff, 0x1}) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x4000801) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000180)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000080)) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 248.525859] SELinux: failed to load policy 20:30:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @loopback, @remote}, 0xc) sendto$inet(r0, &(0x7f0000000080)="7f55756fb993c2f65a09303251676052b89d4a57226ae80a00aace09bab71bd78b12959ca3ea4351cac25eaa52289af7cc12df86a21211170375d1fa16b8d059c2a31eba17ef4318d98bffba595e0ef44e0e8e1cfc0d2ea040cca87ff9c5a697c9661b77acdd6ac528060955f28f5eafe68950d862963cf3458f80c38c12ada0a3bebb57177f6213fde0671fb896f73ee5eec5673f985622a4c065b722abe7eda6a6e98ee178b451918f7afe909b871ba67289ec9e2b626cf94ea48b02c0d5f5da2cda6a6a46135e1a44ccce0179d8f0e1af752a25c3a11767", 0xd9, 0x800, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x400000000030, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendto$inet(r0, &(0x7f00000001c0)="1b615562722a942edaa6c45960566535e5943e0ab243cbb9114366d9d6a1f6a8ad72ea51646fcea048b1433213fee9f66500d052ec55f448c1881a3c1fd9018ab0147cdd4d9d26550bf15fe211f897ac755f2db885eea88eec82532d8c76f50ab849e49ef2d97e3837f681d5859453f85cf6c69619248a66cf0678c4a59e4bbeba97f196d5720b2884944d3eab3b07665ae96b8340afe8de", 0x98, 0x0, 0x0, 0x0) 20:30:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:19 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r2, 0x12) r3 = dup3(r1, r0, 0x0) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000240)={0x16}) 20:30:19 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000fc0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) read(r0, &(0x7f00000001c0)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x326, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x3017056bedf3b96e}, 0x20000010) r3 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000040)={0x10000000000000, 0x1, 0x0, 0x0, 0xf}) creat(&(0x7f0000000000)='./file0\x00', 0x50) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) 20:30:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r1 = socket$inet6(0xa, 0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000080)=0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x810) [ 248.959703] SELinux: failed to load policy 20:30:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:20 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x8000, 0x0) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)=0x0) capset(&(0x7f0000000240)={0x20080522, r3}, &(0x7f0000000280)={0x40f7, 0x3a, 0x3, 0xffffffff, 0x6e, 0xc68d}) r4 = dup(0xffffffffffffff9c) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r5, &(0x7f0000000800)="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", 0xffffffffffffff9a) readv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/77, 0x4d}, {&(0x7f0000000400)=""/158, 0x9e}], 0x2) io_setup(0xffffffff80000001, 0x0) sendfile(r5, r6, 0x0, 0x10000) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f00000003c0)={@multicast1, @multicast1}, 0x8) times(0x0) 20:30:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x6, &(0x7f0000bfcffc), &(0x7f0000000100)=0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000000)={0x3, 0x8, 0x7fffffff}, 0xc) 20:30:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001300)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r2, 0x0, &(0x7f0000000080), 0x0) setsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f0000000140)=0x6, 0x4) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') [ 249.707507] SELinux: failed to load policy 20:30:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:20 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4402, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000240)={@empty, 0x9, 0x2, 0xff, 0xc, 0x2, 0x47}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/connector\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000300)={0x10000000000036, 0x18, 0x5, 0x100004, 0x3, 0x0, 0x2, 0xca, 0xffffffffffffffff}) epoll_create1(0x80000) ioctl$UI_DEV_CREATE(r1, 0x5501) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) dup(r2) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000280)={'lapb0\x00', 0xfeb}) socketpair$unix(0x1, 0x40000003, 0x0, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000600)='\xd1?\xf3\xd7v\xdc\xf2\x05\x11\x1c\x87B\xbd\xeb\xc90x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14) bind$packet(r0, &(0x7f0000000580)={0x11, 0x1a, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e23, 0x6, @local, 0x4}, 0x1c) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) statx(r3, &(0x7f0000000280)='./file0\x00', 0x100, 0x1, &(0x7f00000002c0)) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) fsetxattr$security_smack_transmute(r2, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000480)=0x68) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0) ioctl$BLKROGET(r4, 0x125e, &(0x7f00000003c0)) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000240)) connect(r3, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r3, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 20:30:21 executing program 2: r0 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) fcntl$setpipe(r0, 0x407, 0x6) r1 = getpgrp(0xffffffffffffffff) io_setup(0xfffffffffffffff8, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) r3 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='memory.swap.current\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x110) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x200040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_validatetrans(r3, &(0x7f0000000100)={'system_u:object_r:hald_acl_exec_t:s0', 0x20, 'system_u:object_r:pam_exec_t:s0', 0x20, 0x5, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x71) r4 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r5 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = memfd_create(&(0x7f0000000000)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000080), 0x4) ioctl$LOOP_SET_FD(r2, 0x4c00, 0xffffffffffffffff) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0xdf1, 0x0, 0xfffffffffffffffd, 0x173, r1}) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) fallocate(r4, 0x11, 0x0, 0x100000001) [ 250.335991] SELinux: failed to load policy 20:30:21 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x20) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x8f) write(r0, &(0x7f0000000400)="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", 0x200) r2 = getpgid(0x0) getpriority(0x2, r2) sendfile(r0, r1, 0x0, 0x10000) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8000000000141042, 0x0) pipe2(&(0x7f0000000040), 0x800) sendfile(r3, r3, 0x0, 0x40a199) 20:30:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000004c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffe90}}], 0x2, 0x8000) 20:30:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x40, 0x28) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14) bind$packet(r0, &(0x7f0000000580)={0x11, 0x1a, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e23, 0x6, @local, 0x4}, 0x1c) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) statx(r3, &(0x7f0000000280)='./file0\x00', 0x100, 0x1, &(0x7f00000002c0)) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) fsetxattr$security_smack_transmute(r2, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000480)=0x68) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0) ioctl$BLKROGET(r4, 0x125e, &(0x7f00000003c0)) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000240)) connect(r3, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r3, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 20:30:21 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0xa3) openat$full(0xffffffffffffff9c, 0x0, 0x885, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp\x00') rt_sigtimedwait(&(0x7f00000000c0)={0x6}, &(0x7f0000000180), &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) keyctl$clear(0x7, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) 20:30:21 executing program 2: clone(0x904, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x20001000000003, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) accept$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) r6 = socket(0x3, 0x2, 0x40) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r7, 0x410, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc041}, 0x0) personality(0x6000003) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000540)={@mcast2, 0x0}, &(0x7f0000000580)=0x14) getsockname(r0, &(0x7f0000000680)=@can={0x1d, 0x0}, &(0x7f0000000700)=0x80) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in=@empty, 0x4e21, 0x0, 0x40004e23, 0x0, 0x2, 0xa0, 0xa0, 0x6, r2, r5}, {0x7f, 0x1, 0x692e5f85, 0x6, 0x2, 0x3, 0xffff, 0x2}, {0x1, 0x4, 0x6, 0xcc5}, 0x5, 0x6e6bb4, 0x2b87501df7a8143c, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x3c}, 0x2, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x2, 0x3, 0x4001, 0x7fa, 0x1, 0xcb}}, 0xff57) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000ac0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84007404}, 0xc, &(0x7f0000000a80)={&(0x7f0000000740)={0x330, r1, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0xd4, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0xe28d, 0xffffffffffffff1d, 0xffffffff80000001, 0xcc6}, {0x80, 0x10001, 0xffff, 0xf5}, {0x624a, 0x0, 0x9, 0x3}, {0x1800000, 0x7000000000000, 0x1, 0x1}, {0x1, 0x6e1, 0x3, 0x7}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r4}, {0x238, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x7, 0x81, 0x4fbd8d3d, 0x2}, {0xfff, 0x7, 0x5, 0x3f}, {0xffff, 0x2, 0x35b7, 0x1f}, {0x3, 0x845, 0x8, 0xffffffff00000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xd448}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x4000}, 0x4) write(r0, &(0x7f0000000000)="220000001400070500e80000004c03000208030001000000080002004102fff0f054", 0x22) socket$netlink(0x10, 0x3, 0x18) fcntl$setflags(r0, 0x2, 0xfffffffffffffffe) [ 250.699409] SELinux: failed to load policy 20:30:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/ip_vs_stats\x00') ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000080)=0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, 0x0) 20:30:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = creat(&(0x7f0000000700)='./file0/file0\x00', 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x9, 0x5, 0x80, 0x80000001, 0xf6, 0x4, 0x8}, 0x1c) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000fff}) 20:30:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') fchdir(r1) getdents64(r1, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x2, 0x2c5, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffc}]}) 20:30:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/237) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000000c0)=""/94) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000280)=0x100000000) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0xe6, 0x6, 0x1, 0x5}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 20:30:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x2400, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2080, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3beb) r2 = getpid() ioprio_get$pid(0x3, r2) 20:30:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x10000, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0xffffffff, 0x7f, 0xa0, 0x2, 0xe, 0xffffffffffffff00, 0xd6, 0x101, 0x363a75a, 0x401, 0x1, 0x3000000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x100000073) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 20:30:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x5, 0x0) sendmsg(r1, &(0x7f00000003c0)={0x0, 0x124, &(0x7f0000000240)=[{&(0x7f00000000c0)="ee39b66213e509ad009c3f028dd4746fda2991d750acec10a75ec82e32f9498869f1c0f9a8d84bac00f74541a11b5485aa7adb8fafde5ca3b27b980f45a02ba1b93f61d4bfa8f9b1e1ffb1d9aa8a05f35506546340ca4f1e3d03de2a6f3201ba1458e80f791ee1d8eea7834a9e78f261528871718b05a57b64", 0xffffffd0}, {&(0x7f00000002c0)="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"}], 0x1d0, 0x0, 0xfffffffffffffeb2}, 0x3fffe) [ 253.024889] SELinux: failed to load policy [ 253.038997] kauditd_printk_skb: 260 callbacks suppressed [ 253.039005] audit: type=1400 audit(1549139424.017:21418): avc: denied { map } for pid=8810 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:24 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x100000000000a02, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1000000000003) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000100)) 20:30:24 executing program 4: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe72) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0), 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/access\x00', 0x2, 0x0) add_key$user(&(0x7f0000000140)='user\x00', 0x0, &(0x7f0000000ac0)="971c6ff1952ce8cd7d114c5ba7311af860ac16e5be8a61d339585e417306ba071270bc5f019362ea22bcaf49778f84759caba6102c4fd9478b479a2a2e4944429c7aed8fbf689e7c2f588b1ba67f02c7dff2621d16f39fb4aaa8e05de803d2d4f6cd7aa29d424edc778e3b8419d070cc0dc10d0a3247cf7fc95d01abc42e00f17e564bba98e04967d6305de593b2bd4dab312d9c2bcecf94c377ec5bd4aad3471b02dff96dd6f03204e02ec5758af2d86f82361db3ead04daeec140cfd617fe60f3b673210ef5c3986a9f2b67ebe3edbb4674c2c1645e273549dc7824a01ed70ed9f8e1cecded7b538e388be6aeda701a0395351c3344d22c48f1eafdad16dbb833d905604636a3461a56f004b7a6ad19284f8595d5776df708e9adcf47cd758f740719fc701eda84360ac579584ac9af545ed2bdcb9f9ce2266a7ec9852a7ad7107c1d86168c7ff92462f69d7adec11506fb59e072b9f6a90d9505becabbaf4174887bfcb6461b0c714bcc668c9175b984f0f3ead356f1929514b5670133bce1be4025fa5168b1104b6a535e60249cf6b8d9799097400c85ceb1e90538ce77190e05264d16f98df5bbbd2985922d423deba76cf20cadb0333c838edcd4d771e5393f3b2bd10bd6a0ab78fd94262891ad74c2b63c0976e7cce7eee98044c8cab4b84342a989904d189f7d9b3b1ec91d4465c93fc87e22538cf87a24671c1798779151e676cb9db9178250bbac20fbefd01e357e4e8e5971dd3e79f5d30ade3b2bf39bbbc79d22323f709129d105c1e94411ca4b11eb76f338f4884dbba26f7d377481c5c3423c67ab19c92bb9e8fdcc03dbb5d420596e3f42308ed4f44762c842ec0614acbeff91d7cdc34f88d07a31aa12d2e464a2c379b0925552fcd22d02acb55af11d1101f91d5d89bc3e6f489d779c1f52eaf7e5e17599ee1d37f2b44e54a591c5702a7f13021e707c4105553c763f2fe6858702342883b19bb9b2cf7caf1585d14126ea753916f4d51bd3e1a85df609d25fa8d9086c80c635308425308702207c3440aff44ac2b63814ac29937dc79215ff8682ec8497552ae5d8433acd7265500d378142a18fd4d18d0649ae909af32d2523d06897e8c32091b42f6ce38681567d4441e1ec7c69e1d1c6e8897190c66d2025c4578c1bf8b5d9efecc0c33cf389090f56ca8161706efc96228980dca99df9181468a0acf4c6c8c0c4a60fece1161a56fca459a920938caaf48bf082619bea242cf69ab16b92974645f9b5b12cdf64737d57afbb67debb379bdc670b9818ccbcbde42f87dc533158da2fadf3a9a5697767ef05d8808b8816b3c9455fff72383a11282097243f36fca4a6a10eab1c9ccba21eb5645028185b387901a00970a498188d0a5ddc5bd65f90c356ae2c0433c859e943d6d4149555112be9508bc103745d25b2fcabcb60d323329182fdef2cf90488a831c0dacd032a811674df676cbaf7c47f351ea1b664882ed7cfc62f0e310a711400e66746ca45dcd1a63cbd6fe42c0ed9cb55ea26aa819d31c4d36ff6c072ecf6f9b723c492fd21368c6ccc072b52e3b30b95d78b043e9a1ae2b3106986c13beb016890e7c4b094c4355b2fa463c8d9e2c39f039e5ad6107f8c4e39291c666c672beb3c98592f9a1b7ffc4ebadb76a64c280913711ab4c340e8c16b5b0914590de8a3963c2f24ee0b63c7d9fec7a6ba1f94ad84d2faef06a55b64ac3137cbf8f5f3e6ad0fb13e4eb983e30fbf604552a10ab75cfa355dd53e5ca12681a69135da940a0abb2eed186f65f1070c29b9cf8331f41c0759a365d18b25fbeb82875f442378fcc0c61f9961c17983662f3d3d0c69dd7a8d8c8fd996ac46108e473020db640a3a85980cd614e19225c7d7396701da4616eb6bfadcef0222610e0fe866d19ff37a96504e0f64c3dad2f679bcf7844c249d0c07ddba93abec79f3887e047397ed22edc4a2cf251e1fe84439ff6924be31fa451731941b459bc863f655a5565ca570ca76e457a135e97e6efd73e2785fe1b52c7529e2c71f08f54e11960817bc96f5b9a394459ffa86ca737f61c4f5f2af7c66f0d524caec89d220fb7bf05340283a2fc776df9916e75ed05e2e56aa51868df355aae3ffe65347833cb7e51e18e972949601c4d0c6656dd33f9ab0bdb6f73b63954e9b0c190b5a8e7408bfa803cd7c22cb12f8c5d0fd5e360cbab7f66862bff9657cc0981cde165f184de2915c91e5c5c6058189a01ceab896d43a7eb7cfd08a166b537440f5d5fe21c08d4de5feeb7bfc97e43d6ad335e55b359b637d5b645db982df9262b2f7cc0b0255394526f1a03688f43f73034924fb4cfd398249938765f38a9efb4d1e194ebb037a0b1578b49ae4134a48030bbc80053f60ac36dc1b5c14261c84a5e03ed1da6aec2f83a65829a6507f33db0020a1055903bd9421f9e83dbf38531ae05144ab5cd66e9397411795995a160c3e45e9d55ec3e243b69505d7f66bd750107b36ba9582859e1ed712efb653fc251e12f9e3041d172c6a8d495952bda231b076f79898a9514d236a88734a0ec3e30a12252e28544598906711c1c8443a7d3e85f1f5a0abdd15626127a436448b2c9d76946afefd58a98c2b239b33de2ac6ae9159dcaede78c28aff773edac9755801ffa7f153cf31f206351f62696f5366beb87cba89cedc7a2c2a6d42f4a11be61926f9380ecf06bfb47e20002f9075938190551c285133bccf2b944c187c312104f552b5bcedb021f0e4bf67c3157cb9011b94f6d6df6416dd3c596b88f9f7679c59ebd95eb710cc9fbe25e43a0c6badde989ea588e0e0d071f6acb752cd483b5f1a40bdd01b0858d8be72bba0eef5ee7024ab9f2bab69630e3d795d892c4545bf0dff2922e5644aca93f105b6c56ce1633fb9020ac0a40cd60e219ef95d346ca52fd8cc9e9b58dda4243fbd4e3688a613f58e2581687c7fb857ede15adf2b994d8cb458a002226b08c80c1ba41ca7d2afda3e797907d6db3e123ce87c0a4388a9ee3c1a8a65c5b426204e023af3d4cfd676086799578cbe24d14818383a6cb19cbb6324a0e2218c6381a73deb117f22353164ebd96b50fc757a83a189cfbd605c28649f8ad0211446e586e7c05962071f36c5e00392dc9badfd7ca3953de8a29e6c41205a543ac86486bf390debacef23975c410293ee026cc6471a13bd0fa4c2c9d58bdf1b2a8467e7ea37465e0a66549dc55427db20811d73a28605f8f1f19b0029db0fc7e2457e6a519f7a0dd2258490e86a1552791a92e43a5184eaa06d1204350205b854d606ce3bd0c74c6824cdf9db35a2fd2ef01ecbb9d9175442c6fc0dcaece973ac3304ce2fd44d322f4c04843749eb35a041321ba7c27f9031b5e5a9bd328680243168877b9fa62e3c03ff9176d4b3eba2f91ebea398010ee6dee1fba420bbdee01d253693005c62b79b379eb103c08df793ed9b35dd72763e1c98d99c63d93214ed27a915c78fa4865c01a5f5137e0392ac13be2461b135a163f6c73819af4594e2c0cd6fe612f8a4a75b0b16caef26ce56f2d1d9b3da19d1c6162ccf6b00095392809cd666aa8940914527e60ded12d7f9affc2402a3777f1f5bb7537231d7fd2165dceb65ab72a1f30d2ff6f0ba63eebf71c7c5da8961656e8f606a4721261f08c8c8c8745de0888ef5b0b9bdf2f698d6ccb3759eae1f87c73f0ea7bb50bb5607ae81876ab80d32b2eb979cf69852d6ba608e2bb9009287ee5a03ad6a3f5f706ad533216e97dc81a4e5aeabb7f33a9d0a4f8a2664ecda9ae133d86e05701cb9572d4e7be1ce99b4fad460112599385ea8750327fdef87fc0527ebe75115f2e8f05bf9a6d9ea2a48ede6c743156ba00d530f549191c1d33d203a3db08f7933b7c8cc51c05f5585f577e9ff3ec1713bf3b9b408d598207faa3162ce2fc7bd10b331d89a0fc4c5593c16f78b08a8c65105d91d143e602667e99cc9a9b760de0e371eef36e3f45c057e8e56219757151e63ab2ed28070a39425306f5e504144e53c434630f0c3c636509905eba16cdb0f388bdf0fd2dc216d955b58db3c98d92d8af0beb6eacbecb875ec650452df86813c738b41079d53aa0eddb305729cbe8a984514c22d95b6d2c80c7f326db2cca86a134f1f84b649483993b92ab0b170480093d87b6afdb154ff58eb1f1e00f29f0cd822d71783460150b0f89f5cfa99456b6376a4e765301ec400895f35d286b6342b1c03bc167a2be02e87a3f9d9a59fe165ea7af437b00dd73cc1a112747b2c3cc6876ff9d16e3c64e7738e2ffaa0615928f05719220ad81ae1c013d1f055a4a490cd1e67823b0365c4e093eee1daeb4e2d7232dbce14acb3eb32cecd256470ba4acd0398952a0d7975558e4b469ca9f124689ec89379483b703b86293f78133c2f251ff4daeda7fc76c5d556b1763ea1c918a5768d5561feda733ee929bba1172afce2b99e336bc7d193b88694a783a2924066b6a30ff5ad1bfdaa062d00ad4a1a0cea9cb7072c41577cd9799ee8dbb132dc0783e296d1d73f4462e8a3b8192edd575e1a091d391c3e5792ca6ebc58a6bb59aa31df9078c44c489585f54d600fdbe1925de807b7fd1e0436c965220711196e4d6253f30bc0c5dd336bfd1432aa30e010efe1024aff0b052fb6829134835a04f351c87b2327395794b3c922ff19ce2c284508a9f6ed32ddb774e7e33ea4f09a73e851ac73f15c9c33a95a91d83e4d8203c4ad9141dcee28f34e46692c3986ac9d62ee1b2f856374844fbc828063a53d3e36e90313899e3e6b4dd6502b5504c924e4ba2419bee3f1de7e1d127c07cedd47059ce54efeb8843aafb737e2b00661d0d70593b1ea2df33b0f9ba30b2ed174c0d76a3725260c6a4dfb5b023ce0804b0dbe62ed67c547331e46549e11578042bee3a5402c2d201a810bb1c13319ed84321a06b183258132ba6240eff8cc220c613785799f567741cb32447fe5a5149e0f3814cadfb47c5071f9861d8c2a6028f2f3ab9c2caf79f08df4dc3524d672ac5b0e91360193da1a2330b921ae0ca6312c7697c9cbd42fc8a49f4d0e8e528073138d75177df77692038a0b9e2769c0f4569a627d8ca288f0961d5eea733e28b8763b84bb688eae9f4b77c97295e2b0f6a66ed12a7006f8f1a47ee02ddba9640c565031c12df549b2105b938af4cc121330a71fcd89ee9f77e0b0490850a989f1a9152a49993a317741601437e23d8d19fa6601131d274fac4e819c35a43f87703d5440b272a56192838d636e4e5c15a03fd89c0ae9de9b2c89dfcc934fea6035b93c49173f06a06ef3aab752e86e06d03dc05d628954c939c95f09d4928b0c98c314478b26ab441157f832e1b9ffb20f3ac64f310c272155da00d261cecef667bcd59a8d636be3dce921ace563f23dc0c6541bda524ffb7cd491ed01d869665062fc07108e182cb55e99ecbd0e5a4422c0fb953d148c0bad5b68ac02bf30c80e66aa8d6e3e527fbc5c83219184a42e3998674dcfaa7383ce45ce08fdf5fff7a4486ed9f441a95e8da56d91ef37a9d58c415f0a38ae50c30126f84ed23fe556960b825383bed67ac3213b4221469e2b8dc656a66c16876334c587c9307178ea1a7ce881309880abc3fc0b042c99597cc5a71667643c10e3dcd069dd9eb343253a84fa0ca5c9cdd0699aa6e2389b0eb7b74b46219815f78adb0ebad2aa12eecfe7a743640f4cb758044954f21503740fdd603d4b7ca13315921ca2fa6fd23a4acfbd9da3a706536a4f9c3eaef3c95f01a55b5215c6aa937674d89af2dfff41866feac", 0xffd, 0xfffffffffffffffb) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000280)={0x0, @dev, @initdev}, &(0x7f00000002c0)=0xc) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$KDGKBTYPE(r4, 0x4b33, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000001500)=ANY=[@ANYBLOB], 0x1, 0x2) ioctl$PPPIOCGUNIT(r4, 0x80047456, &(0x7f0000000040)) setsockopt$sock_int(r2, 0x1, 0xdfeffffffffffffe, 0x0, 0x8ca5f89afffbe722) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) connect$inet(r3, &(0x7f0000000440), 0xfd27) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev}, {0x2, 0x4e23, @remote}, {0x2, 0x4e22, @broadcast}, 0x81, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3}) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socket$inet(0x10, 0x3, 0x0) 20:30:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getdents64(r2, &(0x7f00000000c0)=""/165, 0xa5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000), 0x4) setsockopt$inet6_opts(r1, 0x29, 0x0, 0x0, 0x0) 20:30:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 253.232523] SELinux: failed to load policy [ 253.245804] audit: type=1400 audit(1549139424.147:21419): avc: denied { map } for pid=8824 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x8000) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000400)=""/63) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000080)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) getsockopt$inet_mreqn(r2, 0x0, 0x99cbe251215eb125, &(0x7f0000000100)={@remote, @empty}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000340)={0x7, 0x0, 0x1, 0x3, 0x2, [{0x0, 0x4, 0x4, 0x0, 0x0, 0x3102}, {0x1, 0x9, 0x80000000, 0x0, 0x0, 0x100}]}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x3, [{0x80, 0x0, 0x0, 0x0, 0x0, 0x400}, {0x4}, {}]}) sendmsg$nl_xfrm(r3, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x7f6ecbd9ab21f483}, 0xc, &(0x7f0000000600)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x20000010) accept4(r2, &(0x7f0000000680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000700)=0x80, 0x800) 20:30:24 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x24, 0x10, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0x10, 0x94, @str='{user&-%*-\x00'}]}, 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 253.377328] audit: type=1400 audit(1549139424.167:21420): avc: denied { map } for pid=8824 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 253.498027] SELinux: failed to load policy [ 253.511388] audit: type=1400 audit(1549139424.167:21421): avc: denied { map } for pid=8824 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 253.573457] audit: type=1400 audit(1549139424.167:21422): avc: denied { map } for pid=8824 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:24 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$UHID_INPUT(r0, &(0x7f0000001880)={0x8, "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", 0x1000}, 0x1006) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) fchmodat(r1, &(0x7f00000005c0)='./bus\x00', 0x100) dup2(r1, r0) fcntl$setstatus(r0, 0x4, 0x44000) finit_module(r0, 0x0, 0x0) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000000000)="0f008c6973993238595d85233cb11d71a6cbab19082ea5cca7d58cca98e422850331046f0dc19f20954eef6d0cac2ccf0437c4767fa952044c1a09b9786ee1ea7c3225dcbe23bb8fdc8c955a4f0f5624329fefe6ad648233dee1049c418ce4045b2e69f8afc25105a841e32c85193b6d785f2ea51176217111a60265a268f764bfacf295282055e79dff4e483fccabefff9cc12b91b3166f29df506091ada08e51b4aa8b8ace463be40aac1089e413047ae104f96505b36a62b9647b40465bba5207a42fa7", 0xc5}, {&(0x7f0000000100)="58ee3744de807a3734bbb5f8d7987714c3f924fec003baad49111b3264d549da34e74aa582040e76fc2aef4c2b7df7a8ce749aca60f33e82ebd381a630cb1decbc3ebc03a4c1174264f0f48277b3e8e354f289135d7baaa8a7e37932fce7ec3f37b769a536e455fcc9edd9d084a9555bc0e1d88f2da064721c03407f24bd60", 0x7f}, {&(0x7f00000001c0)="0255fa596305e94fe786e9c47b69e1d5e77eb1deaa8235cf4366df7e6c3983c6eb0d391a99db9ab8fefaf6e06caa92b1f642b424c34ef1ecd7ed4c9da91c48d1f4e91542b5b71af2c8f003f7427f485643e1bc8dc1299b5fe7cf9d3f633c119ba1d5abaf247ae0f1373d0881d76490c4d1508822b9c0bbb15227735dd3bf46da5bb45078e06d1c172980ad65a000943aeae7f78d2f5470aa8da6190fdb3a65c23d149488553bc8eef327dfb7a25d977cee134de69aa2f2546174d03798441826d7de2fd148383bd9404f633e233174613e07e008669a9baee5be6cac83539c0ebb6e23b3c4fd4096c00df08e83c264597647964f5b", 0xf5}, {&(0x7f00000002c0)="0314acbecdd0b583b18a25628230adc48a93e3fd3b12c44be6ca39a91f720675b95b1f1bfcd5c666f9242fcf4f514ee1e84c95844b130f0f9183f25ba09d0d9e280cbb960001f8811e02eee0f4c785b56357969ea1f537528a6d58f72c32ea3fcf87", 0x62}, {&(0x7f0000000340)="1e0cddb193f013b1f3c98a4694331f72411e1537e36290b480a849eae6005a8780a674f0566ac38f311fe956639e95cee5654940fd1d48dc9f1a0eac51a1034d3e00e28329b3a27c2ff031d51f592f7e0519b522cec13516a7f0737a7ef625f28668438c78f761eb1584f64ec77a84a1fbfe7da117258a8c9a3fe009e7d57ebd7c1faba61c885a", 0x87}, {&(0x7f0000000400)="50a6bd57e3c0464dc00c7b72dd610d0e5bc924e33969b7a9aefef84ca4c558aef9af2e91a3669c454f4d127e64e46e032e6bba5f00eaf750804e8b8b50eb8362faf8300f08ff50c74f7a569fda77f734c714e53481c4", 0x56}, {&(0x7f0000000480)="b5c8674758698be66eacb611f1c1e3d1114ca3535211cbc5348714f7521ceb39a885c6bbfc1681d2c6b84b8f2768f4f35b63729a95e7c30cf125139f59f608092371fdfb6c4e38a744e0c66c041a319db7a47b2d12801ef7d6a30147b117b659335540d200f692e2ffb049e383959544c33fb774cc188fd8", 0x78}], 0x0, 0x0) open$dir(&(0x7f0000000580)='./bus\x00', 0x200000, 0x100) [ 253.677636] SELinux: failed to load policy [ 253.687867] audit: type=1400 audit(1549139424.167:21423): avc: denied { map } for pid=8824 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 253.763764] audit: type=1400 audit(1549139424.177:21424): avc: denied { map } for pid=8824 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 253.866890] audit: type=1400 audit(1549139424.177:21425): avc: denied { map } for pid=8824 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 253.915483] SELinux: failed to load policy [ 253.965085] audit: type=1400 audit(1549139424.187:21426): avc: denied { map } for pid=8827 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 253.996328] audit: type=1400 audit(1549139424.187:21427): avc: denied { map } for pid=8827 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:25 executing program 3: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x35, 0x0, 0x1, 0x6}, {0x6}]}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f00000014c0), 0x3db, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='(\x00', &(0x7f00000001c0)='syzkaller\x00'], &(0x7f0000000280)=[&(0x7f0000000240)='syzkaller\x00'], 0x800) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x4, 0x81000000004, 0x1, 0x2, r4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 20:30:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, 0x0, 0x8001) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xf504e6026fb82f23}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, 0x3c, 0x708, 0x70bd2d, 0x25dfdbfd, {0x5}, [@typed={0x60, 0x8f, @binary="9b5f83be9d0a63d8b88ef4d50474b74328db42c04b17c3ca62cc8efb1b6b83e2a645955c37ae2583ffd55559188550091767d103e12ee52e028b3a2ee6d44764eecfed178b32c1ece3c8ac5986aa5eb36805998c15cc9d9979ed60"}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x4081) setgroups(0x430, &(0x7f0000000200)) 20:30:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 254.184760] SELinux: failed to load policy 20:30:25 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x80000000003, 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x130) r4 = getpgid(0x0) ptrace$getsig(0x4202, r4, 0x1ff, &(0x7f00000006c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) openat$cgroup(r0, &(0x7f0000000600)='\x00\x00\x00\b\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000008c0)=""/248) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={'ipddp0\x00', {0x2, 0x4e20}}) accept4$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14, 0x80000) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') ptrace$getsig(0x4202, r4, 0x6, &(0x7f0000000800)) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x4, 0x4}, 0x8}}, 0x18) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10002800}, 0xc, &(0x7f0000000680)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x3c}, 0x40) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000780)={@empty, 0x5a, r5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"]) clone(0x8020002110, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='\x01\x00', 0xffffffffffffffff}, 0x30) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000400)={0x1, &(0x7f0000000240)=[{0x9, 0x1bee, 0xe1, 0x80000001}]}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000000280)) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000300)=0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) [ 254.328026] SELinux: failed to load policy 20:30:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000040)=0xffffffffff, 0xfffffffffffffed7) close(r0) 20:30:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:25 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x6, 0x62b, {0x55, 0x2b, 0x0, {0x8, 0x1}, {0x0, 0x5}, @period={0x5c, 0xfffffffffffffff9, 0x791, 0xbece, 0x1, {0x5, 0xb261, 0x39, 0x10000}, 0x4, &(0x7f0000000080)=[0x8, 0x7, 0x5, 0x3]}}, {0x57, 0xffffffffffffffbe, 0xfffffffffffffffe, {0x0, 0x5}, {0x3, 0x7}, @const={0x84, {0x8, 0x1ff, 0x80000000, 0xedaf}}}}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @cond}) 20:30:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000a00)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000a40)=0xc) sendto$packet(r1, &(0x7f0000000140)="549fa93351c7062977df2e3ad0fec097d1910bf18cedcf2fa59ded01a0e7917dfeb9bd3446918f3837c306d57ad0fefb4db3839bdec033bec75a0f064dea8d678e5bfa3473c3879acf930c0802c5183a16cd57df6f8ad2bb6b64b7de9838895d76d7689c346ab6914a6ac8cf6460b1eef4b2fdb3ae4795d743d9e8eda51ead3ab630ac96867fda13d7c23c3fa123e7fbe07d294553738d70af886e501a909d42fea8f44371ec6c158123acbf042456e32e1a4385b8a03eff285a1b219132a9", 0xbf, 0x20000004, &(0x7f0000000a80)={0x11, 0xff, r2, 0x1, 0x10001, 0x6, @local}, 0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc002, @multicast2}]}}}]}, 0x38}}, 0x0) 20:30:25 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20201, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000280)={0x10000010}) r2 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) pwrite64(r3, &(0x7f00000002c0)="192f8f0c9460e03dfdab979f87f179296b6b0f5843e8da79eda0961378e8424d60e32ec33a1a12b0af543be6deedbc3b8280f7984cf1f9f1f967b5d427239ed128e82bd902153a6d242fbdc67d0b39997afcca788c46ff0de8ffc2d6e834b757fd924df118e6b706c1e1959b633657635dd0dcaf43cd59fb26adb7c922df4305f01b", 0x82, 0x8000) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f0000000380)={0x52, 0x4, 0xffffffffffffffff, {0x5, 0xbe}, {0x7, 0x5}, @rumble={0x0, 0x81}}) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f00000005c0)=""/4096) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000200421f5a2aff05cebed8c59b4e23000000000000000000000000000000000009ba00000000000000000000dc104f495eec3900010000000000000000000000080014de126ba475dec5a4a21642da2d5c600000400000000000000000000000000000000000000113d60000000000000000000000000000000000000000000000"], 0x90) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f00000000c0)) 20:30:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000480)={@remote, @broadcast}, 0x8) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r4, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_setup(0xff, 0x0) io_destroy(0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB="a2699abebcfcf7c9ae9348925489147c965cb9be1846e449f59b7b7127e9c7abed48319ac0e96bc576eb2625ec8e654e2afebfe68342cb3d10e177e92a329e741c841210194bad128873619049d2c8205d41ce8c30838fe3f33664808e72cd1905e1b1a9ad2a4613326c2415f38ea1ecdcc2b9ffaa0269e1aee3df1bc85cf5d1212c5261b11e9e8c966202d241024ee269c45d0c2b12930f2ab34a982d39ae91562b2afa1601dc486d93a79f4b7b2eb66013f5423477766d5518af9ec720b7bced9a3857d7e80e"], 0x1}}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r2, 0x4c01) syz_genetlink_get_family_id$tipc(&(0x7f00000008c0)='TIPC\x00') prctl$PR_SVE_GET_VL(0x33, 0x13d4e) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_delneigh={0x24, 0x1d, 0x611, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0xb9}, [@NDA_DST_IPV4={0x8, 0x1, @local}]}, 0x24}}, 0x0) [ 254.747371] sel_write_load: 1 callbacks suppressed [ 254.747375] SELinux: failed to load policy 20:30:25 executing program 3: r0 = epoll_create1(0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x40) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f00000000c0)='syz0\x00') r2 = epoll_create1(0x0) close(r0) r3 = socket$unix(0x1, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) epoll_pwait(r2, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x5, 0xffff, &(0x7f00000001c0)={0xfff}, 0x8) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000140)={0x7, 0x4, 0x300000000, 0x0, 0x80000001}) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000200)=""/78) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000f2cff4)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)=0x0) ptrace$pokeuser(0x6, r4, 0x8, 0xeb31) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000100)) 20:30:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2020088}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0xc0, r1, 0x401, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001b00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) r3 = dup(0xffffffffffffffff) read$eventfd(r3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r4 = add_key(0x0, 0x0, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) keyctl$unlink(0x9, r4, r2) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) 20:30:25 executing program 2: getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = gettid() sched_setaffinity(r0, 0xfffffffffffffd2e, &(0x7f00000000c0)=0x85) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') renameat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00') r3 = getegid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setregid(r3, r4) r5 = socket$inet6(0xa, 0x3, 0x1) r6 = fcntl$getown(r5, 0x9) fcntl$setown(r1, 0x8, r6) poll(&(0x7f0000000240)=[{r2}], 0x1, 0x9) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x2, 0x0, 0x1, 0x0, 0x0, 0x80000}, {{@in6, 0x0, 0x33}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x19}, 0x0, 0x0, 0x0, 0x10006}}, 0xe8) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x1, 0x200000000000000, @loopback, 0x3}, 0x1c) sendmmsg(r5, &(0x7f0000007e00), 0x400000000000058, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0xfffffffffffffffd) 20:30:25 executing program 0: rt_sigtimedwait(&(0x7f0000000040)={0x3}, &(0x7f0000000080), &(0x7f0000000100), 0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c}}) 20:30:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0xb, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netlink(r2, &(0x7f0000000040), &(0x7f0000000080)=0xc) set_tid_address(0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000240)={@local, 0x15, r3}) [ 255.085537] SELinux: failed to load policy 20:30:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x1) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="026bd7c7ed86389fa1eb1c492cc14c3afaf2450d647abf82b26329a886560198f22140397208b147619bd0206fc61e6f9518bdaac81b01fb66c252a928beb0e824bfe78f261383c5993c08f87ad39d7a3500c9658758c717d2b8a2eb47228270904f1fbb06d2138ab176e477e5220ffb4545cfe1a5bc19d65eeff8d82ec3", 0x7e, 0x0, &(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000080)="1dc3a7b230dd763d8065466f617f02347bf02a", 0x13, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) setregid(r1, r2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x8001, 0x31) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) 20:30:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000)="ab30095d23fd5e0f82f4f17b15e374e23249e3abeda6a62b343632db06dc4b711b785033bb4262", &(0x7f0000000040)=""/123}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000000301ffff178598f50000040000000000"], 0x14}}, 0x0) 20:30:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x6, &(0x7f00000007c0)) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x20000044e20}, 0x1c) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000540)="2601d490db237c8aeb550fe95c6642b720dc98ebf4f51f922c4ac6ce1dd4872612c463a6733bba7245a1e606df758b81ebd52befd1f84c85701a372f9c85d61e5368fb2aca6161a1011377d0fa13bd445d526cf9c171d060b1364007549370242439dd0422903f35b8eb61e28c48de7adf793331725c3bf6b7017074a9699ebecc94426d54526b7dc00c4a1d7fd18029a1fae243c1475b4a5f7c34e7706e814a5c88fb54a45d", 0xa6, 0xfffffffffffffffc) add_key(&(0x7f0000000600)='.request_key_auth\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000680)="88c812a2a14fcbe0138b0d50bb24a5911b1dca3520c7a5c553a21f718cbc60eb553dfcf3931aaba22b686e1f57eeafdc6de2581c9ee0615d5fe000adb603", 0x3e, 0x0) r2 = request_key(&(0x7f00000006c0)='rxrpc\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)=',\x00', 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000780)={r1, r2, r1}, &(0x7f00000018c0)=""/4096, 0x1000, &(0x7f0000001880)={&(0x7f00000017c0)={'sha384\x00'}, &(0x7f0000001800)="6cebb17e2095172fe0e16b6f0a2fbc196a33a080032ea21ccc1b4639d6c1263c57d447a4dcc44756b90fb60ddacdb149330e5faa2dd5dc9b9fb9b55ea4e2a31262bcd723a9a801f41e20b34ee1b0fb952c41d4886bd23f3cbadf577c25574f0b1265d6e6d7b7b708597675376838", 0x6e}) r3 = syz_open_procfs(0x0, &(0x7f0000000800)='status\x00') ioctl$TIOCCONS(r3, 0x541d) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @remote, 0x2}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000840)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, 0x0) 20:30:26 executing program 4: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000200)='\xe7G\xf0\xb9\x04H%\x9b\x16_2\f\xe7\x7f\xb0\x90T\x05\x00\xe5\xffR~B\x00\xd7\t\x95\x89K\x93\xc8\xd7\xad\xd5N\x10\x01\xdf\xfd\x8a\x13\xeei\xf1\x1f\x13\x96\x7f\x902\xff\x14\xd0q\x00b\xc2\x12~N=\x0f\xd0\xc3K\xd5#b\x95S\xd3\xe6\xee\x03C\xc2_\xb1\x00(\xde\x8dOFxy\x18\xfb\x01\x13\xb4.\xf5\x00\\\xbf<\x9d\xdb\xa1\x941o\xc4\x0e]wu\xdf\xc5/\xe6\xaa\xf3\xcce\xaf.a\xbb\x8b%v\xa0/9\x1e\xe4\xb49o\x96\xfc\xad\xf6V\xd3\xa0\xe2No\xea5K\r\x1a\x05b\x8e\x05\x80\xde\xfd\x04\x06\x97%p\x9b\xff\xfc\xc8D\xdcW\xb5$\x10\xde\x06I\x93,)\xd2\xc1\x965\xc3Q)Q\xc0\x86\xc5\\w\xa5\xca\r\x1d\x95D\'\xde\xae\xedj\xb0P=\xfb\xe2\xdfL\x8d\xeb9\x98\x9dj\x12\x86\xf2X7\x03\x87\xad\xe2\x98\xb2\x15n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00e\xea\v\xfa\x13{H\xf9+=$\x8a\x80\xe0\xd8\xf2\x18\x1e\xb9\xac\x14W\xfbs\xd3\x04\x97\x81PIh\xa0\x19\x8f\x1b\xf9S\xf4\x84\x7f,\xa1\xca\x967\n\x87\x80\x05G\xffB\xc8\x145h|\xa2\xea\xbd&QFy\x89-\xe6\xf8T\x8e\x06\tcDn0s\xd1\x82\xdd\xebV)\x16\xa3\x0e\xfc7@\xbe\xa3W\xb0\xa6\x11\x7fZ\xe8H\x16\xdb\xcc\xa9\x15q\"\xad\x82\x9a\x8b\x157n\xca*\xc8\xf2\xfay>\xeb\xfa\xa8G\xe0\x82F\x0e\xb2\t\x94\xa9\x8d\'\xfds\xb2(\xf6Q\xf7\x0e\f\xa1$x\xf4\xc3W\xbe\b\xbc\x17\xa0.\xec\x9b(\xacI\x91\xa2\xdd\x9e\xef^*s\x19\xa6\xb8\x91\xda\xce\xb2\xa6.\xad\xe7\xce\x9d\xb1e\xc1H7A\xb0z\xe0\xfe{u\xfa\x1d0\x8f\xe5\xc08xl\xff\xe8\rr\xf7') clone(0x4000103fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_CAPBSET_DROP(0x18, 0x6) futex(&(0x7f00000001c0)=0x1, 0x400000085, 0x0, 0x0, 0x0, 0xffffffffffffffff) io_setup(0x123, &(0x7f0000000000)=0x0) io_cancel(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0xdc52, r1, &(0x7f0000000040)="c3e9cd15f4377ebd2a4191ec447260c7b49c260f65c0", 0x16, 0x5, 0x0, 0x0, r1}, &(0x7f00000000c0)) setns(r1, 0x12000000) [ 255.501697] SELinux: failed to load policy 20:30:26 executing program 5: pipe(&(0x7f00000000c0)={0x0, 0x0}) fcntl$setpipe(r0, 0x407, 0xdb45aa1) pipe2(&(0x7f0000000100), 0x0) 20:30:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000056c0)={&(0x7f0000000200)=@ipv6_newaddr={0x40, 0x14, 0x90b, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @dev}, @IFA_ADDRESS={0x14, 0x1, @mcast1}]}, 0x40}}, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) 20:30:26 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) lstat(0x0, 0x0) quotactl(0x1, 0x0, 0x0, &(0x7f0000000280)="ad282633f99bceaf053eb348eec0d65e30d13b0f8895c715018ff1fb09dd46fc8e4b0460dd0fb0303d34d968326b111179b54e854df15289e7076014cd3012d058acd9cf6a7420acfe1bdbdc487d060d00") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) symlinkat(&(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000380)='./file0\x00') ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x1ff}, 0x20) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfd, 0x6101}, 0xc) [ 255.726018] futex_wake_op: syz-executor4 tries to shift op by 4095; fix this program [ 255.763196] futex_wake_op: syz-executor4 tries to shift op by 4095; fix this program 20:30:27 executing program 2: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) fsync(r0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x9) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) getpgid(0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000004c0)={'ifb0\x00', {0x2, 0x0, @loopback}}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = getgid() creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r3) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r4, &(0x7f0000000500)={0x43}, 0x43) sendfile(r4, r4, &(0x7f00000001c0), 0xa194) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fbaf0795f69760a0fdb3da2fe05756139f38c971e2c1da06067ee7d5e4be51cb0ee46a7600fa00450d90ca5ab8ce3c8acd91cc697710cd1d9311397c0f0a2a3515c1431e1612b73dbbc751fc050d176abd3e4bec7d458f5b886c15a816ca4daff460c0544d1cdae5d2e219ab1023163b0a44802fb8e63406ca192ac710cd9abdb26f0daf0c4fbe0809b74cc05ee1fa15535d6aecf81c00000000000000000000000000000000"], 0xaf, 0x0) 20:30:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x20, @empty, 0xff}, 0x1c) writev(r0, &(0x7f0000000540), 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, 0x0) listen(r0, 0x7f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000240)='./bus\x00', 0x80002, 0x0) write$selinux_context(r3, &(0x7f0000000400)='system_u:object_r:hald_log_t:s0\x00', 0x20) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000580)='htcp\x00', 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f00000005c0)=""/216, &(0x7f00000000c0)=0xd8) write(0xffffffffffffffff, &(0x7f0000000380), 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000f40)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) lstat(&(0x7f0000000080)='./bus\x00', &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r4, r5) ioctl$int_out(r1, 0x0, &(0x7f00000002c0)) write$cgroup_type(r2, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x0, 0x0, 0x1f, 0x0, 0x3}, &(0x7f0000000280)={0x77359400}) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0xfffffffffffffffe, 0xffff, @ipv4={[], [], @empty}}, 0x317) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000bf4bbd75080000000004090000debc4649cdac1a37be54833f76511cea4c14084d7000000000005bfdb01096418539b29d421412de230766e7176d8f420f560c04b7f66c0180fffffffffffff502894800c62a7836b4fe00000000000089b563196ac066ca9c571722807c6e71562427097885f07095c8a6bb04ed501f1540eac9770193c922808a5837a1677ba7020e0dfa126297d7b6578bbc05b994920486132fe79803000000d704e7bd330806b2b6b5a9a0655ef0a443e8421998320206387efd15f482816c5f83d5797761b93ec249c87b3b2f47406babd94700005cfd7a63e542346ff12473d3b70c90e5b85705000000000000000b3eaa702b407d26692ab3dbcfa71419a353acd3f4d93a1dc8576bffff00004c000021f4ec8a701a156380e5e3d1262102b0ff0fc96cbf6c14135d147812ffd967e0392fc6f96860030046b58cb2ffff000000aefab42a0b1b8ad004375231253dba19073c68d91f4d64917c0971bc000000000000009c7a000095829b4e721796e52d851ff2ca5d60c98bcca778156f3a57bb651abb8521dbfa383ae0d75140d96e27dee6350af4f2ba38bbfd2e4f184ed522a656e7e2258f5d6808910a4106a27e6d2b1e2d39259a612f2f0c5760e9727fe26b9c30ed83fbab37184cfe63d2fa509526ee82be854c896fdd52208acbc220de8576b5b32a4b4507aad5ba3d8c1323433d63904594d5243fcb400000002c001ba4a9e6ca912c473f0eeefeac1b3653cdf429b807b877b4837d2e79c21853830500000000000000626f0d3400000000000000000000000000000000c2749f7efe7963025ddae373cbb20938f09e28c5a4dfa279bcf2c2c9ea9ba08e4334af49cfb9221a8e765c5d17a82881f20f08d1a16d4003006ec743f68ed32f539bafd0e9f98fe412adb518d070de9c695553819fbb1c5a81a98afef47a31d38fcb52641f424eabb0044ad625ac0ba1d75482cfb606b83eec41629c8a728c9acfe6cd9758c7524fcaa420a3f4cf6a08d500df0907f1f78055dee2215132e6bbcbcbbc592ffba523824e78303e58087703ee5cdd832bb325bfb342021d831a812418efd3234e5b1260ec86d9efe9fa79289fd011a9cde57bcb91e95f47709e13d63422f916a978d9138e7b26b25af87ce97272b0b8f5a23bb256b066429662b21625125164e60de60027a4e0f204599fee0f61c90ebcb6d2176dcc07f89180c4c3d84b66988466c4011c06001c1758c079efc55d96612016e33f5e5f2bcc3e1d43c03335cf61878d0172cf42c7d2aba2f9836261696f3230ddface388eb2f71e012f04eb8ec31413cae3f2466dbb686d7bc07cdd9a000000000000000000894e21cc8b08b17f3b8f7bc31b4c4b9bef1b733f7cce5617f309098c9ea1724ed8adedb95547c25d495dae3220e2669e01bc834a262e20a4e351708e1d922c8c4b7e9fcd9cc47a68558c8ecc5133363ef3d2abc6c6925017c92d9805960c9830074c86d8f55f8ecc572248e6a76886c6c8f32bd4ee4e40cd6428fa7ca3e0fa0abd68cadad2137ec705f8e242c9cb14966929ee14d3a69d790bea0eb22d210979385db690ccb37a2a2fdc220d76c17a5be16f803149d09aa8a5f2b35c73d129cbdb9d35db2a9b69002a841603803d5e568f74b0e1ac8dbf5dbf197c8829754d0bdc5344a40d336af1fe7a6732a3667ad9a471601d57d9aaea3f1ff060590651ddc934dce54b9005ad04c26ad4a6f09f2b4667f72912404529e69df30b69e2d8303ef6a6b7c4abe7e07c482c3e5b39d5c73bcf5adb081dbe5cbe30d2a0ca82cb135c5f20829e98e96d95564b0ca6caaade9ed60d58cb49605286f4b1e33b20bc9f2a5c4b308f9343ffb8360b3f2a6882cf64d5f0d99c519fe92985f7048f09753511cdea60373909558359dd07bb7630124580c417e197f6609f4764182e619b71adf24d10e81b91a0e1b478e54c5fbb1925b99f345210808c5218cda64a94092792523f43dc419d04a1ea9a217a6d57a00ca52f155e2afacf47c713645bcff5711797f0d68215fb081d477a183134d4fb7e3cc76dc59cd0a9b1b2d5ec43f1346a2950e1331ac5d6e903f290bbcf549c7bcbc61266b2ef9f8a25ca5194932265d809dc00000000343753a016f31313a11392f7f22517d8c4ec66d93c5bcd226422c983b0dd8f1ee0930766956946125dd757fd417ea5106f082505b0ff316b3984b5f88d4097a652ff38679880d1319a8f5f9032dfe5f78c5d2caa3aa676793552ba0f04f07bb5149126a16067d304d5b71729e569fcbd1adc4af8b9b0848ab4d2f821ead53d803c1b7b41e6109c58030b4dda934d64dd1a76f739a711b24cc768d22010247bcdc0ce6a09bfebb7e37c672fae9022d558fb32440487fa23ea4017fdfbff2c85bd46af2493925b34f71b065092df2d21b8ce3488a8340fb590fad5ed018fad6a0b82192985230232a353acc4ffb0c9932cb7b04266c46ad886439be20aa05f8bc61d5808417ab9de007a46b53a74c645e4b2dd4020a86e82901f93c9cdf97be1e3afbdea0f428bc3218a5f21d08d312604d9fea4fc"]) listen(r0, 0x400000002) r6 = open(&(0x7f0000000340)='./bus\x00', 0x200, 0x0) r7 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000480)={0x9, {{0xa, 0x4e00, 0x80, @local, 0x10000}}}, 0x314) ioctl$SNDRV_TIMER_IOCTL_STOP(r6, 0x54a1) setsockopt$inet6_tcp_buf(r2, 0x6, 0x40000000000018, &(0x7f00000003c0), 0x0) 20:30:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:27 executing program 3: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xfb}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 20:30:27 executing program 0: syz_emit_ethernet(0x12, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "8cf3ed", 0x30, 0x0, 0x0, @mcast2, @remote, {[@srh={0x2f}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@remote]}], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "893703", 0x0, "b2ae52"}}}}}}}, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) sendmsg(r0, &(0x7f00000026c0)={&(0x7f0000000040)=@generic={0xf, "28011299fca41008beb18e028d3aaac017da187a8f294f275a5b7a37ad3646e682df2b92e91fd1bf318ebc270989afb266826d94de1106d12ea96d76c3364049f9f28d6fc8fe8e438541ece8143f467a2b76c9b201c9fa9b3035e6b0f599cac1c73e56eb88f157d2ade3a7da52c2fba7827007f8204acd8cc593bcfa492f"}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000140)="57be19f64c656e9c4cdaf22455026fe0a3419829ab5fa5848f1e28772dfbbaf27e61c0b429aa4a3bade3070e0035372dcd86fcf025b94adb8502d27bbfdf3999e1eab57b734e98e033b4c16ca63131844bb00efdfab982994403496877504813e863176acc5844c1416003713dedf555192a10f8f0188cb12bdb04556628f1dd257926d63b2f5ebe17a97f32a83424f4a5b3a7463c702cd1e6f03c1717a370f7b65bf087af085b09303bf23b0d150beab04d0277987a852984f2591d78faac2d95d80cfe3bcc8615803ea14192ce675e7820471f235bb522ce548349763744e0fc5382cc293d4c0101f72e708ce804952a322ccd1c19039cb6905f9dc859cca31558cb77a369613375b0a7d3f4c3e7e5b02fe1c39f4d5a8cbc0029d3d451979c2277ca03fcea9c5f63e79b4ecf7d06cd585447976ce1b3a4b1231a6f46d791d2a17cbe5987b8e932a9f5209386e33de4f593d8c97c15da0202f7588d9c7f80dfac503734c67b26108286795ac1874161f522ad4881d693cb8c59a93638f71111b24a8235005f493d1829dad744e38a0a12774a798cd8a1cb243af0342f451066805852d8ce8010d36e67c0fd23bbbb1112567507b44092186162f0171ec08de62ec72a8ff7f9ea3c88483c64451fff5eaea6c09a3d88577334c792996993e1005a1d314fddd5eab8af08fe4460514fbf7026a2a92784b783af373d15f26b13967f4a04ecffabd52ba5404012034bc76082265e9da64dd6d8f7abf1f1cce75056adafbe2548e03a43a0fb46a3fe4a1a4a9eeb72653331d04c55fdb15d160dd3f25549ac19444f888df7741ec2f2b7df8af3eb494b1f1b74e47bd808406809d895a20e8a252feab127ddf41bae900c602321457ae2936b00b62fabfea7557b79bfc2b5d7d7f3cc1141ae9467a96c6f25de97ae3aa8ef4a3bce3feba49ab77d7c6bf5c8f2bdc825b9d47fe6a7976560ca5b168e564d91501954d7b8d0374d6ccea4752ac1425ff901d47864d42d041315a6103fc01ba783aa15178d9ea38d37fc24d7d47cfbc99c466f1db3fa3ace8d8787b401646dc00aa6d0a9ec1f16e7d048061a61ae52b1828de8bea1734b2bfe55c4e382c29d6684d45a1dff5db80db0785d398f2599692c62571798ed83c03446c977f5cee181fe0308972344bcdb432b179d20b79ca38033d243846d3e451aa3fe248216c83348eb3e1e5612e71cbe5bf4e2be62ecb4804eea9523acfd044fee89c484d1297289766d2706c7efff27a8829beb4876cd2fcb639ecaf9cd245c48d214094d43b8a770c264c904ae81fd42c65a5608c261d87de5c4607e2a7df46172ffce916fd3a327bbccd7744317e64077ac4dc21cc8b8619bdb501292bf8fcdc3c722724218f3c48e2d219b0c241625c8f19375c07af0c0c23ef165e28617420e9c224e08d36a676ba90ee72980def408e007d932eed0dd153869ea43d1a3e25b5c90686292439bef4bafb9910bb8e4848c0e11b99651c05da25a64a3d70c0e2704f9296321c19f971ea9325617a135a0e6a845acb76bb6b3119667a50e2a029b3e40c9de205a03e209819960a959b02248296e16730974917f5e691532e31edd1b405c083a8a594596861478e454a59c3882aa1a0aadcc17696ea9c63a1a71466d0e517ca89e7c216150270fdaf84e9e1bc023929340356737838bf665608735b1a4a127ddd6bdf9bdcca0e734558904818af3c05984ca04afe785044f770962bc26305688c86e9147d9f7670d394f90799ef9660f2a34722294cb077c49f5bd762b3b640bb5bf00aee38b1c5f028337d78ee0162d8c3ee65250a64d8a4b390a9636546b830825b4cd09a138b09f4757851dd3c85b931814531fdcbea4205ff4c44c29b83c4066d7ea40fdf1dad430e6fb80f4f2ff6830bd4b19e300e39f29eaa24a1605b65d3c60a031ac4e7656311dfcec927b61ae43c2847cccc55fff1d94a40ac6d59a48639190dc1776c6ab41576d41dac5349de170de830ad4ad2a1e1d9107642c190eb5643aae2b850a66320f6624aaf4fcdb70bfa5cf8e6c2a7df77320328957da7f7f53be496ba8b4c1546af4149155a82bc1521c6ac9a53622de4e8952b4664ad0f2f20a77d7852bf7f9a54e059dfe85542c0d5b40a61cc4560b649ac6e2b20d80ed993c26434c04be104f137eed9d3d889a83602c0e0911c175830568feb3ba54480bbdc693bd34cac2e55859531d23e5a40005e09b60c87e630e7af860ecbc1f214536ee2b01d4cae85087390ca3a9fd03a5c94f2383091ce3cc084989c85d66d4dacb334363ded7a709f17c7d04d6947275c98a747ef258b18dae654f25bffc9d8e713d0ed77d4384a9a2b5c35c265aa505ecf580ef83d5d2455196a4fc86d434001a10da2276e2cb04c5d6b41b98d0c1c6fba25339af0c0171503003cb4f00be7a403f3038c6daa03f9c8e48fd604e10feb2285f9d8cd39f70aa501dcbe0017158d931e3aefadcbe17d1346dbf1317e85b60b43e12a09d3e67b39f81469c01758d5d8350811512f42625be5875f342e8241dc81da9ac8cf4c1f4b5a6ca73fb81584f0113425f9bc6f60df82957388458f8f243cbe3343d2c7f0c89afdbe69276ebd9fc48a999180edcad735e6f16f19244da01f6a74bc9875f7cc39e175968fdb188556b82868d53ba5be960b7559c4c262a7281cdae18e23e4046e8000cfc48407e6ac3251e39b036aa812dabb8d710f1ad4efbb2f8dd3748f5cb6e009d8d328f46e9e65ac3b4bbcdc64689a465b7927f1afd10bdc1a0cd6e4fdbdc6a79d43061f7a8f1ca8fe02afe5ee3ac647a92c342f70c048f37e36f444a6364e245c3e0a1dbc99f2548cd2b0cb185165268c2724fdce30590d818f9501f356087cdc97c22098c394878d2ada58b5e937e210dc11a5debf07aff0c861559ae1533f47296a76e8870d16a01f6e8d5850b4ff6344d9dc219a64a653ee94f49c25f73282a76636fcac8f7da2ee37a85aa87342f129fd22b80190c00a47ca9a28f266cf0048acf6b1d4dfa655c199bde6960db9ff4eb5ede975f7d44fb105922599c1a0b9da70aedbe2fb59871fe3b9793630ce5b0fc4d201acb8ba381482a2e0b6deacbda1d46e0d950d07ce12dbf81016f18fda133fcde696def76a680c4174f0ee60b39915eb35d61ef9569a9bfeacce0b3feeb4af9ec6c26e323416ed863ad086b611721358005e481d2bb8c11fa0dc08b3debc9cc965bb822fa1b127ca256819c269dc38c60b6057c73a41dbf26d351f8578e8f77c55dc5e9557a44fed68e29e27edf8801598d23b6559f4b23a4a1ac7582057148cfcd26fca50971a139f351ec51678c26cea6c7a0272356bb84b781728b1086d717addc69941995961a07f02436a5a0fd557c012e1ff5cba167fb0519aed828a89788c7fa875a1d0d518534d4d7214d3b5ff2d9be180bf21e524cb1d49f6496994db8a164f2c5f10ac4476f499e5b9bd64a68c465a3b25df59d8d7b84db5e1ef748d6819c990440aa831f19c981fb52bc524aecf47dca60dcad770664825860bcd0342a100778a8e905d3ccecaf472cc964af92441dd377185a9158c1427109cf847cb8dc5f0a0381dd690e5d18707a0fb67cb67bd6b6e8d8c22cfbe653b91ddd8a7074c71d40126c9b033ecacd87f0871fb62855c97f78a2e182f3a37542227f0e5d1c5b99c4e496860884f13862a64d126ef26fcad01523264f45b9afc3b6680ad436a0b9217375f0e43e4e3b0733906351f6553c42be21f4ae851232f7bffde846f7013aa50a24507c2efa8c457f9631085a31fb7e42f3935cd42a0824bf1054063d3efd025b3be0b1c0daff15c8056416af7c93d54076b54c7b9f5c3e2dc7576374c4091f5bff85c4f96b88662d891595d1e7f8b39f1f14e3fbb9bd6c5a3153b1c731f08d2483364a92120229624d7affe9c38105b43f7d68dfb29cac954ce3303a35c565fda624c87b239b5fb8eaa8d44c35bd8dca85834d810cfe4c6d5979246c2d22577bff28d1120620e517d03aeb600931c600fd397bb63cb61781dcf4459a4c973858dc50eaed54bb9677a285f3dfef1626d6dea34693c2dd022f3da8ca90ed8adc4db879a8ec6b567250171e1051aa44d6e09a4942dd95ddcb7ef9ee293a4bcf804195af1e9104f2baf9188b0cfc4ca086c8aec6fcf1b0fffd8e4f645704ff3b6d1f7ce6e4492592954b8eb61ca7646254bddff262244beb86ede0b3417f4496286c5a7da570b244fc3c8343599194b9d5c1c2fa8adda843b10ec412dc8f594116c1f0a448b8d2da0ba8b9232d70e03ce2ac76d0e81f317798c3b0061c64dc8873107986ecb27e0d3883dfb5a795dde7225b9b339f4d5781ba5700c12971e639fe374da59c1602075108bfa36618e9f8833428772e35955e80a1e70465fc6782d9b005d006676684e2e0e68b868ab71f0e51b36ea8ab2fc6c566fb1f3dcf3ef91aa7b347b1a4ac335711e6ba5e4667a373b50fe4758f40247350da8792d76eeb57427c9d870caa1dcd539daf177e04ca48222317a3c2064614390876a7679611841c4eb64aee2a13a64aa0bd56c7ced0519146cb2b9ef8e949fe5562ecbc6086d6c9aec330b060531e175031a996bb87544a610802b8a2aa03fa24c93b5acb39c3f9123f298569edc3483fcd6c0e8bd7830a544d7973c0f7991bfdc0616b6ee2971d8d2890c31e463f9e27c7b699f7b2c8e9c5c5028c0ebd3bffda422a6c9ffd4222e05f2d0ad6bdaf446d9692106999d81e4b30a155d46f61835b716b9708771c076a73094138bec1ce1ce7ee287e6d36192e6eafb80412192fc416c6bb4f1d1db5757beacc478f7eaf0ed06b728dcbc39f2b00c9bea3f8a0b18b0b268c69be1f73dee1f77baf253c438bc6e89c0835eb547bf754c4c3c19eaa47e34a63153c2325720d04f77d9dbdb7befb56977ebce763c0954a0dcb2c43e3f36b4e4451ab1d090beeb797f46b39601d65b4960036677113f0a0c68e2bd11705796bf5663cc8eafa809907aa5ca41c8531c688fa520171c00e31da84677b12ac97d16c49f9f600f039979e05564228d11967c5cec2a07610ef4cdcaea5331f526947fa2f201f23676b36b5d00bf9be4333d4be2574bf051d6b3dd54e87cb74564a26ec52805bc9c394e87430df181ba688e14bd3eb2492d753923ab8d08271d5394bcab1f17db0a01b202ec63c95f8e46caca4a37278b9e914c8414e01e67f70384152ab8b031145c717ccc5f5016055f1231084ecf247ea0c178cda30c72348f1c34f1fe1e6f025815fba48a6a28536cd6e0183248dd6931bb934bd4203b8d7fccb949198649bab723af740233e2a9d52b2b5e8c4612dee807df7bc68bb14e8b03d23815878e30f9afd4be35c7e6fc71df86fc0af5feb019d42a04dbf96ad932d995c997f6e50280afd5bee2bb21cd0035ea03c9a8a3dcb1cd78f874e54988bbed5c74ba48b4e3a40a0ac2fcdbc8451fcff0281846a802c6a23d95fd4051e877f8da0f7e96ed14446f0a7c311d00b41c258b2c3d68ab0173c07a96bcafb15db07f44f2d6b08b1bb6816b081f86faa398bd2427c7adb4375a3a72feb013c703b0ed84ba1e6955919161e9efefd4554160349abec84a94e41e61dec3b27785cd1c0882c88a0f35dbbf34e4f4a9bffe30b361a41bd56fb155fd53a63cd61d5679bfc89be1fa0da02527de800c43cf21288436e586055388f9c7430ddf0e1d4ca35c4de1b7407373f0ee5fb2d1df9ac47dbd04c46596dadf4da635ec10d8206c65311800eabe3d4d1f90694bf3d0a7755a8e9c4171981e22ee5", 0x1000}, {&(0x7f0000001140)="88310fa5871f48b04b5aa4952b82b4ccfbc1af71fe3f55d6fdb3169f3fdb062ed801e5c2fdbcf1663f4a6e6400c671ce3604f08b4f4e0788f2f95b2ee07520750e3e247da3122fa2abbad67be9aedb0d00aef2cc2e43cdc311cde218a10844c456b418c113808601639b9d42afab58773ae4c080a310ccfdc061ecb2c556eb6d26ca719b9e3cef9b2b474e6ce22a5a4ecc53431fe5b20b5c17ac33cbb04d2e0620cd0dd41d5601cb323b069b30800300a0635abad348a02d30985ac3161abe3601abbc624bca951ae3", 0xc9}, {&(0x7f0000001240)="57b340f5d2f14129bb59d56208664f224c2572d55de41cf4389e206c28405dd276391ea667af073d94c113043339ba67edb23b520241c34e51747e55af7e1c8da0206b58edc75badf83ad53075ad879315a97a7134b7d597213c63d72e769625393d26ea8b5770addff62cb1159e3570014366be8eccb184b8e8aba107", 0x7d}, {&(0x7f00000012c0)="39ded10ea1c15bf58102b36c3c35f7a198c03e625c54477d8a040a19689d1c1c5941b47392123969bd13830886cd1ccaacd285b84b400347ff31b0c4e72f3230f8b5fdae7ff7d5b25ef6efb271b6f765a9ead4c618c7691f27da0239c7205eee33c6feafff8f77465fef997d450d7e7c3ed7afef01ddd396c8ab934213c5f173d935b9bd", 0x84}, {&(0x7f0000001380)}, {&(0x7f00000013c0)="75829f8db2a76475a07c1d4a4e12ea44855d03fbc30a169a75bd715cc8272b52dfddc32355bda8b09dec083c17a3391d7f32a50d3b0ce5d6b3ff8ff5544c91c0ccdeaae80eb802d0fd5b39c1919171d6554938aded967910d6976ae0feb0676e82bc44dc6b708998fe346c921dc3be6004d895e9702e769603a4c905225a6d7dffc422e98f2ff751a75a40b066e314c9b2ffc6e1ca", 0x95}, {&(0x7f0000001480)="8c39240bc645bde0da08cc7e3c5cf860708d7577d43725ae79c252f4311d901da1bbbc3ccb529606b9a3bd425d13a6192b0ceda37579c58d989a6d4731e11484f7d4740b939762f49d1307a9", 0x4c}, {&(0x7f0000001500)="778b546417508bc6e5f1fc19e3502d28964fead4c15d77a695a953a3ff77b6c9c5a2e087a6e29d0f5530a1c9edfa95d2bfc36cd0616a34c5f6a09d0a36c7745744a1958a7e30e57e2c1d1218c9be853dacb13d4f62f7eaebda4aafcaffd15227a40db4aa4b589f1727dbb0421066656c43c6d04d7aeb4cea47395db087cf39bcebe6337b87d5364f87dbabfca2afe2aaa73e66e473cfb184d26438114f515de1b1e805e68d5474ceebd2af433f762f4f63a994219c5d5f1deafa28ac4e74e0cc9ebec1f0f9a2e88220b7097f63a3769a1f4afbe4e524b42d52608e6088643260f6dc2f886dc1833b41a7c00306c697f17828cccd4899", 0xf6}], 0x8, &(0x7f0000001680)=[{0x1010, 0x13f, 0x4, "24c69240abeb1d669d800e9e4aed77ca36adfc00ad4f9b2ad7095da856599082d630706cc77421d85c594193ff08a257c153a37fa785dc333980910ec72f68bd6825fa3b56f3a12502c590d518aa63209745fc5ded9bb31a23f8bf957e1c5e75bc73ab88e06141fba91ebe348ca97a3df5b8cbdb0dbfe41b9b8cd69170a43d597492e5d431a8579044af00892e659ece525f5792479346a2fb1709cf03050a454d5b363394b178fb3ad9e6349aca7d9851f778004cbee256b22dcf36723432d599e4edf1a33628a2efaa0a5604ddfbe5ead32c0e9853b78d02a9e314322af578d0b7dbc9639aa534aac72e003b06caaa9336bee898d2687d342baec02e77c0b69a880d162e8c0b5ff00146fe7675db84ee80bff2b13960953bd4a6bd180c406cfb543d19a1680bd8f5299f6361f916d3e0e9d78a97d462c54dd61ecf2c9976ea89a26827777cfae7c7d1e285acdb3712f7681c71c6aa57b8768d8c76c614c44670c46d93add76f75789a9e553fd2c05eed733d702ac1e8e7de462e14652e7368378a8b8a9e79904585d052cc310daf7320e8e92a75c733d6c1292d2da7417d678dd89c034485e3a99ae502e31ab3d009179f82db40495bc453d9f00e104a0d8efeb764bcc61d0c5d42ff17166fd0e4baa5d3a1d9d7d7b2af7726f99231b0da9d94cc7ed44cfe372b5db42db5796a3b45ca2e988db2698032891e961ad3eb490921c28521922df304db934998ba57240e2b7b55acd4f07d0402d88467b580f43e28641ade3dad1e46baf002f81da76cc8d12eb434f5d1f079997865e10b22fd1d9a78da4fb264a1ab5f445197c90169dbd35344bb0ecba5b670e56e4f94b28c5bd889a8c85de411f539842cd6643edffaf46dc51ae24901467ed542f5afd055968f5edf04e54c99454120da2d1c078635bcda0a32107badcac516de19fb9acb18991b233f1d16ed359c51ff45d70a6115ad8a35899ff7a006a15a7b81ff79298c7cc227633c824505e2110e7db78a870246c992717baa38a8ea189088bbac2a594c8ba7d3812f67f65f78af28f7d07e2cfcec5fc66793a13242668331bb83b088a101622d3e2a65bb0c6f5330e550839a019ac3d2e07584a632aacabccced2dbef3196cf8e2fd926caf0d2e8944b066df125472b331f53a20ef9d043423131f3d7fadf718ce9b069b41c879a0e7d6cd9053596073221ae1d6d70d04800f89b80463e0697347192b95b8b6e4e5c56f367bdc977c5a01be794dcae04144e3a4abda4e31866683ee21f6701e39a4efc5a3367f66e877d94712e71b5fef06c793f20fd7240281ae0b62749ca89c8af433acc280b58deaea75cf63c328c8c65a9b51d2d91b1de3610f6c19a040afba53c0d716ffb9335225246a244b112574ac2bf2bf8cd25431eb0cf0bd783ce4c2956b204b4236b51d9bb50628208ca5566a75370b0499f0a34b4b3c3b1844499de58b8dc72824dca2769aeeb895fd7d637af2de815266568aefecd2c6a649c13a8cb1a7d29194f243cf94ad0a92a99f60391e4efbac9029bfb2692098d41d537e9e5f59e96b183aa9824fcd8fbad7e34c8b30dfee53d87af3a0151fbd6a20a6bfd73498e37fb98c3e63c41e2e6e3c1d9a65baad5edff776b9071f04333dccd95feb4f6d7d0903657c387368bb6fd5ff45c7ede23dae5ab59adc7bf2712b6df7b807306ec5621ce0104d54c1d35a0af8303c818e854c297deacefb6a09e7efff2c053996463f9f36002c6255ebeee3355e8aa9566675dfbe189fbe69ab44263f427c3260af9a960564ac98d7b6d35655e05c6183ba676575d33488eaa2791fd27d61cc8be5953a238f9aec51de9593c549160e170a894f871825bc9fd1caa37a35ee02f4254be4d8d2342794bddf36d27de7b70af35e38687473378b0c8341d29730b74b4ae70c569153549b62fe584e0e024ee7faeacd4579d4e70adaff0d08c89d0fcbe18817ab5b6824bc516734dc73ac04f28bfcebb26f3cf631ce3b9dc6624acb99c0b352aba8ae423ff3d14200fc730b8ded2a011c34183e0eaa84e876e71b947d36960fced7b5be51ca7f2fee0741c035d2a6cc90272979ea7a8a3fefbda073fc6b1dc8837ea9484934e92933e2d1b014e477c606b9ef4d59c609288725242ee0d6cc5d579760b1a5850b332c06d56e4138d49c18b46f0f0d735e6fe14a130924036ff450604903ebadcb42e52d18b39e6401b31d849f0705f11e454e1909ee2517c4bca2ac3d8fe0ebe2ef182761e1c281f89f16c3df25e50cf9c4f967e807034d2914550329795fac9929983c0d68c34fe3d7afa2dc9090b3a748f6349a90150f1ec770bc13c2a0a0d77d7183bb7b901d47dfa19a473beb629b296e692454d78320ee2f8204ea01c377dbfeff8199c64650dc125e11cfda141025c09f5bccf4f80565ab9f84e5cdc88267350217fb83d10e11036eedd57bbcea25efc53bd9a3b48b320af4ec48a858b7a8d955784ed1db6293828a9ead7c8601c2881e323f2e1de8dd433e2c5809c89c096d4f12076c8e3182f833135323d1f202ec34374433a455b4ac650831e2677e57a01ecba28e712ceddf1f5cb30cd29cca6eea67aff9de0437b449e6f4f2f3d454a4d9c360559af783d4416ba73a241122329459c2905c17fd03c25cb6dbb8634fa456c96bc16ab29fe8898b131cd9cb6ba6f908984e598906674a8e2d6e26476d910d42b29a9f5fa6df9579b2936a4452b36085b0a1dc021fb1d6c2dcf9ca996da655202f4736bb8863a3b990f6840449732eb6cce3ae52a76d65b2ad32d86c5f34c3ee43c6dfc54bde7f868fc0ccd68a30d211e2dc0ce8ba6c6c93aa27e3f0c6989cca2d659f9f3da247ea1d16e3f67d0a2421110e842e0d3b31cddea14ec801bffb29bf2c581f04125b7c3b038db112f088e3903d029eff5aadf2641da201e1092ef46c16d970e5dcd6dff3ab6da66d154191c80dac39b06c8867a5e8f6fcd0ad409b7b9370a40af0a4973fbbfb1c5c79c807a33621f84f1b35f3112c46583d2908029bfb65f830b173d269293a28459ab85fee6e315e03ff318d77c1e71bb199bfaca7fd4f0ca68a0651941f8d6c95869bfb68c95f5b01531d25599d755a5c7914414831997c18e390fba7e9f38e93d58e5d247c714b118c8c1c183c90ad9d8680977a1bc786024a49f64361d9206393ce530453e5a73508f141262f974a480eec4ea20024eb8a55b4a77f0dc30c5e2fbdf0a2b0868ecfbfa731ece08ebff47c8bbde8585f61406b4d00a7f2b17389a01bc81eb731bdcaa39741490485f5e614088467614c14a16e47836d2007c8f0a645089720a20c7bd9c91f874c631580c38d8f63a4703fbc3a0a35e42be9b984eedf7fc9997c4ee8481dfda108570589ab8bcf733268a4f0822e8816e21f484472604c35405019a595baa4b4d1a791c963665bee5f9b1e3d225ce5994a5eb28a9c006ea5860187c1f071fb4388f4e1106e4afb5003c1e23042bfc4607eaf988cf0d3d7d2a4499780da3f46d6604c4233e99ffa1f8f2f11339b18a039f207fc54968f19e6d3a5ceed4dd877656aa846b270d680eda3b38b87cb81a4d49173e9fda9949cef7e02449d601791a14aa631b3b450ed38d96c0ff27279372870e5d832233357a096aa07cea61efa33805f11a74c8f5e8efe7d7d9b492a270116db1026b825ea60744a06810d02f2aa5011ce618c71726d37c0e0aec3c4e6356b42e120a4e49f9ee8d27d7bed07e8d632f3eb7880189fab22b9816143c459002eb969f6128f1b0c76d067fe9e7592a5b9e400527266cd630eb136f57b75ae50227815a60af52e699a994b8bc58a01cd90462e5fcb377c02162a0c776687b1b63fa4515bd876ed3272fb10fd6535d0f1a6d7ecc195f26fd2379c7949f3aca970108892ddec488d6950ed331164288f61200db9951443361736e04b59f49e6d96f2d63ecd4d6b3f4a4dffb4dea4f0db424aebd06311eadcce89fa1a272e5bbf7a94d839064211756aa9247e9b7e8f9173b81e835eb3baad73681cad51189c625c0ca1c2a5759f93b274a5b3858d8a51569960231e1206c7ea855fd45b36b581ff6d5d70fe1e7d1423f3c6909f55f4b0c7c32a365eac61ccf7fd4913e9c9eeafdb88a67d8c94483756dddf8325f8850e5d85249f7efe96f77d598a72d54621e2b3ac81d4a7977bfeee051b2c0fbe9afcfab437f8d8339a58d2d9d9558695fb6f2db749ca1d3f4a01167e651354956328b90d452dfce7a8e91f9a16eb932bed4cb311ef1c5f21e227af2351410f0398617a18a152f5434736ed046f2b556d49c2d9c0d398559683e9bc18bda13ccaefe2f58bd4e7ad1749bc420b2f2ff79d69505af1e277c036e9bd8018217af56775321fc7d70c22a63c30049abb5719b31fc8847bb57319edcda18018360afa2a8f02cd045353327bf68d3665ff2d7e07315fe2ca825eccb2aff646ecc9fd3573c756cba69e11244e0cb5ed9002b803198d1d21ad9b5d5991040263a20417ba08c321303a994dc91bf3d735d45b7bcc4f1f862539954b57a3e9f76bc85f0c80d738cb33c57ae261190ae836aee5c9f0d4a5d0683d95579cbdd23840a55655438e7ed1a220a3c24b35def623cfffc75619ef635772773b3f8c03b55ff001158908be92069712418fc5ee4536605947bd85b2e883f22e485ceb72b0d08650faf1e06e17521fee32638c1385ffe7243507c47ba62299dc2fbf23057b2f3d1c2c952d6e5af631dea30db2a6bbf51d916a6ea110e643a859b4f96b34a581f2cdccbb414281e992344b875d24e4d760648ffe989726f4a34321a19eba40da351aded16fe273a9ce9ae670b78e7e7f4107f12c903341eaa4dfa55336c4765f110e9e3792ab00d63f30fa11143f776a7f4f562f576a1f2ed1fc3fc368afa54bdb87e10857a1761f865cb45e5d6bd47ccb9dbb423659373991357801de2d2edcfc3f851fe4846d949274f304fe89c93689b9401e313e595a489d2f56936c35d4025324c0db274ce87c11f539d683800eea63d75babeb723f876cb9d90ac4dc4b518d69065881ad9cbbeb077bf643458aaadbd790ec4f9bce9bea0b72ae8d290465fb79ca6aed35b467c7d917680d24164629af57827a226ce54e3dc5efda55de465fa16e06038bfee5fa4ef841a221aaf01d233904041c41bd2a89e10b46e1fd9502a15aee7b8cb1c98af039ea5bfd4c0965127c3abf3c648c455b1d59750f96a1bbfc58a2c35308c1b1024c8f67c8101a692851565b2f7b8bb34ae8dfb6c090a1894980bf59372482252fbab9f6e60b4b0806e839b78441a2e429660d53b2c046c8d22f098c24ddd7a25ac70d931abedfb5429ead02a51b30f0cd850801ec6b3ba17349e2536e93f396674b496ba2092f7e1f74e0624d857ec7699922cdee496ef7e3ae94761e37ba6acdd3e3f3fa8b311b7d3dab28e9ea321388c44d2f84eae1ff1e650ebef1bc725d364050a5b1f9042c5192b9ce45a72ca206651a1d6d15185bb3b8161580ba7e27dd02b43411b6378d1c2620ee877e2d2d57396af272a8faeb0f03a81c563c2ff08e16f49046c922ca0a65d6959d268df94a143e668a3b6836fa3feb95b66e4230520dc3146a2c280b299e698806fb6176aa6e8035e8badde6246a94d745c1b0d63ba80dc38d21f43188e217e54ddb68a4c6ce75f9d11b2629da75cbad6052dc8954e1f58bd3f3c838f562624b77c9bd7df5908c83f32ccd7decd549add8e54b2a02e2c47f6c6cbb91d1cab402823f90325ad0faefb67e91108777165682d3e23325c705f64ab9e62a"}], 0x1010}, 0x800) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) 20:30:27 executing program 0: r0 = socket$inet(0x2, 0xffffffffffffffff, 0xfffffffffffffff7) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10) getsockname$inet(r0, 0x0, &(0x7f0000000180)) 20:30:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xffffffffffffffa8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_getaffinity(0x0, 0xfc50, &(0x7f0000000040)) r1 = open(&(0x7f0000000280)='./bus\x00', 0x4000141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) getdents(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000000)={0x6, 0x0, 0x1}, 0xc) close(0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x3, 'bridge_slave_0\x00', 0x4}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4b0800000098ee8e05131123abf0d0274e5f84c3354d5f7a0fc07900e9840789c7d1f82068030e499bc3335accc4c499320bc9c5b4e7d21abf0b4726d721a209a9691578b047e92dd7"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) 20:30:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000740)='cpu.stat\x00', 0x7a05, 0x1700) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='j'], 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000003}) pwrite64(r1, &(0x7f0000000400)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad70900000000000000000000000000", 0x200, 0x1e00) [ 256.325593] SELinux: failed to load policy 20:30:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r2, &(0x7f0000000080)="2baeedc83fdb37abc3fc385077795092af45f5859f06ff5506c36eaabc5508d1081bbb0c6c33982ad82a12970f039b5dfbc63663387c25dec36f205404a67f97f19eb2c7edf2bdead1cf36bd4b014cb67fdcfaac14", 0x55, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x3, @empty, 0x4}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00') 20:30:27 executing program 0: eventfd2(0x2f9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_create(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="dd3638b7663d2175d6dd6ea728b34a00cf178fd5ec470078fd408d4db4d8b4ea4248e730cafd0dd2ecab3dccd2735c35d75cdec2"], 0x34) ioctl$KDENABIO(r0, 0x4b36) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd'}, 0xfffffeff) 20:30:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x105000, 0x0) write$UHID_CREATE(r1, &(0x7f0000000100)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000700)=""/4096, 0x1000, 0x0, 0xffffffffffffff0f, 0x0, 0x3, 0x5ce0}, 0x120) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r2, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffffffff22d, 0x9, 0x3, 0x3}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000240)={0x7, 0x5, 0x1}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x3, 0x4) 20:30:27 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0xbf, @rand_addr=0x2, 0x4e24, 0x4, 'nq\x00', 0x10, 0x5, 0x18}, 0x2c) open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_\x00\x04\x00\x00\x04\x00\x00\x00var_run_t:s0\x00\xc80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000000)=0xc) keyctl$get_persistent(0x7, r2, 0x0) recvmmsg(r1, &(0x7f0000006c40)=[{{&(0x7f0000000180)=@sco, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/174, 0xae}, {&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000300)=""/154, 0x9a}], 0x3, &(0x7f0000000400)}, 0x2}, {{&(0x7f0000000440)=@l2, 0x80, &(0x7f0000001680)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/137, 0x89}, {&(0x7f0000001580)=""/162, 0xa2}, {&(0x7f0000001640)}], 0x4, &(0x7f00000016c0)=""/4096, 0x1000}, 0x8}, {{&(0x7f00000026c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002740)=""/94, 0x5e}, {&(0x7f00000027c0)=""/23, 0x17}, {&(0x7f0000002800)=""/31, 0x1f}, {&(0x7f0000002840)=""/14, 0xe}, {&(0x7f0000002880)=""/31, 0x1f}], 0x5, &(0x7f0000002940)=""/167, 0xa7}, 0x401}, {{&(0x7f0000002a00)=@nfc, 0x80, &(0x7f0000002a80)=[{0xfffffffffffffffe}], 0x1}, 0xe9}, {{&(0x7f0000002ac0)=@nl=@proc, 0x80, &(0x7f0000003c80)=[{&(0x7f0000002b40)=""/153, 0x99}, {&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/116, 0x74}], 0x3, &(0x7f0000003cc0)=""/199, 0xc7}, 0x10001}, {{&(0x7f0000003dc0)=@xdp, 0x80, &(0x7f0000006280)=[{&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/15, 0xf}, {&(0x7f0000004e80)=""/136, 0x88}, {&(0x7f0000004f40)=""/185, 0xb9}, {&(0x7f0000005000)=""/199, 0xc7}, {&(0x7f0000005100)=""/4096, 0x1000}, {&(0x7f0000006100)=""/178, 0xb2}, {&(0x7f00000061c0)=""/84, 0x54}, {&(0x7f0000006240)=""/14, 0xe}], 0x9, &(0x7f0000006340)=""/11, 0xb}, 0xf1}, {{&(0x7f0000006380)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006400)=""/221, 0xdd}], 0x1, &(0x7f0000006540)=""/239, 0xef}, 0x2}, {{&(0x7f0000006640)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x80, &(0x7f0000006840)=[{&(0x7f00000066c0)=""/110, 0x6e}, {&(0x7f0000006740)=""/48, 0x30}, {&(0x7f0000006780)=""/151, 0x97}], 0x3, &(0x7f0000006880)=""/230, 0xe6}, 0x9354}, {{&(0x7f0000006980)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006a00)=""/5, 0x5}], 0x1, &(0x7f0000006a80)=""/164, 0xa4}}, {{&(0x7f0000006b40)=@alg, 0x80, &(0x7f0000006bc0), 0x0, &(0x7f0000006c00)=""/22, 0x16}, 0x7ff}], 0xa, 0x40, 0x0) bind$inet(r3, &(0x7f0000006ec0)={0x2, 0x4e22, @remote}, 0x10) 20:30:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_targets\x00') ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000240)=""/190) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}, 0x100) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='+', 0x1}], 0x1) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000200)) 20:30:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000100)=""/136) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') sendfile(r0, r2, 0x0, 0x10001) 20:30:28 executing program 2: setrlimit(0x2, &(0x7f0000000040)={0x0, 0x2000000}) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x4ba6, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001640)='/selinux/checkreqprot\x00', 0x80180, 0x0) getsockopt$packet_int(r2, 0x107, 0x10, &(0x7f0000001680), &(0x7f00000016c0)=0x4) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x110) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000080)=0x2a5, 0x4) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) wait4(r0, 0x0, 0x1, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x32, 0xffffffffffffffff, 0x0) 20:30:28 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x8000, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000200)={0x170a}, 0x8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x7, 0x7, 0x1a71, 0x0, 0x10, 0x1, 0x7}, 0x2c) dup(0xffffffffffffff9c) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r1, r2, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) syz_open_procfs(r3, &(0x7f0000000140)='net/dev_snmp6\x00') times(0x0) creat(0x0, 0x20) 20:30:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = eventfd2(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xcc, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000280)=r2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'gre0\x00', &(0x7f00000002c0)=@ethtool_coalesce={0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1a, 0x23d, 0x0, 0x0, 0x3, 0x20, 0x0, 0x400, 0x0, 0x3201, 0x7, 0x0, 0x0, 0x8, 0x0, 0x200000000}}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='ne\xd3;0\xc6\x0ex\x02\ator\x00') setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) flistxattr(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000200) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fstat(r3, &(0x7f0000000540)) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3f797656350e5994, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000240)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 20:30:28 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0xfffffffffffffff6, @rand_addr="216efe72cd3f053238fa6847179085ef", 0x80000001}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="c806ed89089b21ae7f426ddf338028"]}) [ 257.460811] mmap: syz-executor2 (9127): VmData 35188736 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 257.475687] SELinux: failed to load policy 20:30:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500bc1d002e000066b2bb4a237d00000000fcffffffffffffff034389c7dc01e5000090a5c6870800000000000000000000000001"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:30:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00', r2}) pwritev(r0, &(0x7f0000001480)=[{&(0x7f0000000000)="ac", 0x1}], 0x1, 0x0) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x80800) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100), 0x10) 20:30:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x140) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x100000004e20, 0x0, @ipv4}, 0x1c) connect$inet6(r0, &(0x7f0000000080), 0x2d) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000200)=0x8, 0x4) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/36, 0x24}, 0x8000000000002000) sendmmsg(r0, &(0x7f0000000040), 0x0, 0x0) 20:30:28 executing program 0: time(&(0x7f0000005ac0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000005500)=0x64, 0x6dc) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f00000000c0)) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000005200), 0xffffffffffffffff) r1 = add_key(&(0x7f0000005980)='asymmetric\x00', &(0x7f0000005600)={'syz', 0x0}, &(0x7f00000059c0)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6807a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(&(0x7f00000003c0)='./file0\x00', 0x400001c0, 0x7f) exit(0x7fff) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000005680)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x42}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x945}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {0x0}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {&(0x7f0000004dc0)=""/72, 0x48}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x8, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f0000006440)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000005480), &(0x7f0000005380)=0x40) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005640)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000054c0)={'yam0\x00'}) getpeername(r3, &(0x7f0000000f80)=@xdp, &(0x7f0000003700)=0x9378cd5c96c3c709) accept$packet(r0, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000053c0)=0x8) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005540)={@ipv4={[], [], @multicast2}}, &(0x7f0000005580)=0x14) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005b00)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xfffffffffffffd0d) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000005c40)={'team0\x00', r5}) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000000300)=ANY=[@ANYBLOB="08000700000000004000040001006c625f686173685f7374617473007535e123fdcca19e00000b000000ffff0400880600003396932eaa5984a034f2dd282e9e735cfcb78a000067c374c7426769882245088afed68f5e6275dac6aa6512396f3a211e52509d000000000000000000000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:30:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:28 executing program 2: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) write(r0, &(0x7f0000000080)='/', 0x1) sendfile(r0, r0, &(0x7f0000000640), 0xfee) removexattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)=@known='trusted.overlay.nlink\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000180)=0x8, 0x4) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x5004, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)={'#! ', './file0/file0', [{}, {0x20, '\xaeppp1'}], 0xa, "4d72352aaf26682cf5463f06ebf74ebca2855e77dda6e55b2aacc594e1675a5569e3b1c38ed0a56101f12d81fd07c13713a93079841301f5d34c376443990c9158cb926b6aa89291be355713814a9cb555592f92b14bcde7925f956e24db09b94f05a3297ab398a9baa8cfdbb7abeba511292c3169fa4204ed783ed3210640517b28c27582d80e2d5d34a098101bde8ee7887efa"}, 0xac) 20:30:28 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x200000, 0x0) eventfd2(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x18b, 0x200007fd, 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0xb85}, 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:30:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 258.066644] kauditd_printk_skb: 306 callbacks suppressed [ 258.066652] audit: type=1400 audit(1549139429.047:21734): avc: denied { sys_admin } for pid=9153 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 20:30:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000600)={&(0x7f00000001c0), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x5c, r3, 0x700, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6a}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc1}, 0x4801) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10001) sendto$inet6(r0, 0x0, 0x0, 0x20002007, &(0x7f0000000240)={0xa, 0x4e22}, 0x1c) close(r1) r4 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x29c, r5, 0x310, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x2, @empty, 0x200}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8001, @mcast2, 0x2}}}}]}, @TIPC_NLA_LINK={0x110, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4f71}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x66}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xed2b}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7, @local, 0xfffffffffffff801}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x77e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x4, @empty, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x73a, @local, 0x5}}}}]}]}, 0x29c}, 0x1, 0x0, 0x0, 0x1}, 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) [ 258.225344] audit: type=1400 audit(1549139429.057:21735): avc: denied { map } for pid=9166 comm="syz-executor2" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=22821 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 258.310567] audit: type=1400 audit(1549139429.077:21736): avc: denied { map } for pid=9166 comm="syz-executor2" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=22461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 258.392098] audit: type=1400 audit(1549139429.107:21737): avc: denied { map_create } for pid=9118 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 258.426410] audit: type=1400 audit(1549139429.127:21738): avc: denied { map } for pid=9171 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 258.449370] audit: type=1400 audit(1549139429.127:21739): avc: denied { map } for pid=9171 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 258.476689] audit: type=1400 audit(1549139429.157:21740): avc: denied { map } for pid=9171 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 258.499448] audit: type=1400 audit(1549139429.157:21741): avc: denied { map } for pid=9171 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 258.525060] audit: type=1400 audit(1549139429.167:21742): avc: denied { map } for pid=9171 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 258.549244] audit: type=1400 audit(1549139429.217:21743): avc: denied { map } for pid=9178 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = eventfd2(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xcc, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000280)=r2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'gre0\x00', &(0x7f00000002c0)=@ethtool_coalesce={0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1a, 0x23d, 0x0, 0x0, 0x3, 0x20, 0x0, 0x400, 0x0, 0x3201, 0x7, 0x0, 0x0, 0x8, 0x0, 0x200000000}}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='ne\xd3;0\xc6\x0ex\x02\ator\x00') setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) flistxattr(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000200) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fstat(r3, &(0x7f0000000540)) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3f797656350e5994, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000240)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 20:30:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300090468fe0704000000000000ff3f03000000450001070000001419001a0015000a00070008004000000800005d14a4e91ee438", 0x39}], 0x0) 20:30:29 executing program 2: syz_emit_ethernet(0x207843, &(0x7f0000000340)=ANY=[@ANYBLOB="eaaaaaaaaaaa02000000000086dd60b409000002290035000000000000000000ffffe0000002ff020000000000000000000000000001830090780009040060b680fa0000000000000000000000000000ffffffffffff00000000000100000000ffffac14ffbb1941d2edcc8da3eaa49a24ecbce0edbbb72bfa98a096ae52c401dc1fc414467c16179099f744ed7723ecc0fa4966bbdea55886ee7c21098ffbf9a594c2cd905d8d741fdf0dc43108e0cde3af924fd92feff901c88fb139725766bc3d595d07a60b71dc162c9fd9f3bd2eed0627f1e14c4ba6ebeb762d7a02a7a2d018c4754bbb28626739"], 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_emit_ethernet(0x86, &(0x7f00000000c0)={@link_local, @remote, [], {@llc_tr={0x11, {@snap={0xab, 0xaa, "b08a", "f04152", 0x8808, "b8d0a1eebf0da639dfb2b36b33ebf800f871eb3ab233fc167d5ff1f3b4fb3fd1ca40e089710a86e4139d79b7c128db89dee27836a2ae90a0303c4f63a36ac4acb2ea4ffca5fa8117d5c3778f60039da38999b8b8cda89f07f49c8d60367741ea60bda34152750807032c129e73a670"}}}}}, &(0x7f00000001c0)={0x1, 0x1, [0x866, 0xf2a, 0x4bc, 0x4ee]}) getsockopt(r0, 0x4, 0x0, &(0x7f0000000280)=""/185, &(0x7f0000000180)=0xb9) 20:30:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x2, 0xff) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000000)="dde20f100fc1c79a93edf7e95ad2a3ceb954bf7b28df4f7b25", 0x19, 0x0, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)=""/158, &(0x7f0000000140)=0x9e) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000280)={0x40000000000, {{0x2, 0x4e23, @broadcast}}, 0x1, 0x3, [{{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @multicast2}}]}, 0x210) 20:30:29 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0}, 0xe4) socketpair(0x1b, 0x1, 0x197400, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000300)='gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000300)='gre0\x00') 20:30:32 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x524) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x918}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) finit_module(0xffffffffffffffff, 0x0, 0x2) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) clock_getres(0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:30:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:32 executing program 4: syslog(0x2, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0xb0}, 0x28, 0x3) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="f5140fbe5f3ed72757832dd96bf96480943aa0d69577688593126a7ed214555b506c967d8f2c260b3a999fb1e276a81f7f5f1fc9cb9208f2660620c5b3198bfa7be7d61fbe2da4ff0098a64048871e9ae89cf58d0afa5c430b548d0e2379809695853be20869bc40b3434aa95ce6dae05ba6e4329bceba98485954c0ffb4b476abd5c1d84d6832474e9b420790a8958975112c37d8a39703dbe378dfb8015e217d1823fce002fddafc654fe367defa", 0xaf, r0) 20:30:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f0000000740)=@hci, &(0x7f00000007c0)=0x80) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000800)={{0xa, 0x4e24, 0x4, @loopback, 0xf6}, {0xa, 0x4e21, 0x6a1d, @mcast2, 0xffffffff}, 0x3, [0x9, 0x65a, 0x0, 0x7, 0xffffffffffffff19, 0x3, 0x3, 0x101]}, 0x5c) iopl(0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x100040}, {0x80000006}]}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r4 = dup(r3) getsockopt$netlink(r4, 0x10e, 0xe, &(0x7f0000000100)=""/166, &(0x7f00000001c0)=0xa6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r5) socket$packet(0x11, 0x40800000000003, 0x300) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r7, 0x890c, &(0x7f0000000040)={@remote, @dev={0xfe, 0x80, [], 0x1b}, @empty, 0x0, 0x40, 0x36f9, 0x100, 0x2, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) sendmsg$nl_route_sched(r6, &(0x7f0000000d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000e40)=ANY=[@ANYBLOB="ffff0b00fbff08000b000300080005004c0000000800050008ad00000c0001006367726f75700000ac050200080402000404030004000000000400006850000000010000ff030000800000000900000000000100018000000800000000020000ff0300000000002007000000040000000001000003000000090000000800000006000000ff7f0000680c000000100000000000000000000040000000030000000700000002000000ff000000010000000400000093000000ff0f0000010000800600000052500000feffffff0400000072ffffff0180000005000000070000000500000002000000030000009b000000010000000400000004000000ff000000040000000600000006000000b6090000fb0000000e2c000000e07dee090000000600000004000000040000000500000006000000fdffffffff01000004000000c5980000ffff0000f69800000900000006000000070000000000000003000000060000000000000008000000cbd6000008000000070000000000000001000000060000008404000004000000e85c744da2d200001f0000000600000015a9000007000000f400000001000000000000000600000007000000215900000300000002000000c80f00000800000000020000ff010000200000000800000006000000040000000200000002000000000200000600000039000000ff030000ffffffff0300000001000000800000000000010005000000e90000000100000003000000ffff00000004000005000000ff00000008000000ffffffff03000000503300001f00000009000000010000007a0400000900000005000000ff0100000200000007000000040000001a0000000104000001000100d6d44022090000000500000099000000ffffffffcf0f0000030000000000000005000000010000000400000007000000070000005b0000000000000001000000ffff000005000000ad00000001000000080000000200000048000000ef6600000c0000000900000004000000ff030000ff000000c8010000ff00000008000000000000800900000004000000050000003f0000000700000001000000ffff00007f00000000000000030000001f0b00000008000000000000000000003e00000001000000cf0800000000000007000000030000000010000005000000080000000000000000000000310f0000010000000600000004000000ee03000005000000050000000900000002000000610500000800000001000000ff070000ed070000588d4917ff0100000500000007000000000000000100000000ffffff470900005100000001000080fdffffffcf00000000000080080000000000008008000000060000000300000005000000ce000000020000000000000000000000040000000100000006000000ff7f0000613c000000000000030000001200000000000000040000000600000001000000f9ffffff06000000080000000000000008000000380101003401170000000c0001006373756d00000000200002001c00010003000000040000000000000009000000040000002100000000010600f0ab9eb1565ed7c09ed3380cc2d84da8040d7afb3f2f2e8a3585d74df0456ee9d3fa35292d39ba98df9e20cb0cc8116c8e540a1ccf4e9260a6ddbfd86758e4b54c1e20a3cb4e7a0be5399be31bf3d0efe4660c0e72bb4009861c1f0ca17a088baea2802aa6eccf144d0f6d563940c7469c2163281812e5852f385ab5d05e161bada7b008b93709b255aa8e490e468261dfe7c54e544be9b5fc50fdd500c6fa9ba38b24ce8293d051b64b1c0876f29371d32245f877943df32b308694da2d1c478cc330aa0b81316940b78c3cf74ee6b754ce5d29664cc17141de7a8aa7c0f8ebb44fd7442d426b24132e8fbbe945819e2fb2bc3c5c9c80fc9300000000005c000300200002001c00ffffff7fef0c02000000000002000000050000166c1d242900000800010037d20000180002001400040000000500080001000000680d05060000180002001400ff01000005000800ff0100000000000000000c00020008000400a600000008000500280100000800050005050000"], 0x1}, 0x1, 0x0, 0x0, 0x4040081}, 0x0) sendmmsg(r3, &(0x7f000000ac80), 0x66, 0x0) 20:30:32 executing program 3: syz_emit_ethernet(0x42, &(0x7f0000000040)={@empty, @empty, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x4, @random="4d59bc559bec", @remote, @empty, @empty}}}}, &(0x7f00000000c0)={0x1, 0x2, [0x6b6, 0x6d8, 0xce7, 0x690]}) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003ff60bf235e540a6b4dc0a63000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080100000000000000000000000000000000000000802b346a4f0398a321f729956293c656dda14bd4b6f322adf398e1f87855d5175fc71a62c8da58bcb67fef4c48c47e38cd4d924b626c8ca55cdd3b35e1fbf35f65af3922b6072ce620c4bcda361566731daff01c54d2334496932ef37502a3c97d6c652c2016deabc8af356cc287087b64d5906de6267b8407d1692b4554eb0510b1979f0808bfe8fc15419089954c"], 0x119) readv(r0, &(0x7f0000002640)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) 20:30:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'hsr0\x00', {0x2, 0x4e22, @multicast1}}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCCONS(r2, 0x541d) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4400, 0x0) 20:30:32 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="04078ece855f48f5e4e5417a3e301b11aaf41cea0a61a63dccfd99e487fdb6e53ca26bdc0af116aa400eb97d6b682d0aa2"], 0x8, 0x1) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xfdc) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 261.576972] SELinux: failed to load policy 20:30:32 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000004900)=ANY=[], 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x0, 0x6902, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f75437d, 0x0, 0x0, 0xbd66, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x6}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000240)={0x6, 0x70, 0x3, 0x1, 0xfffffffffffffffe, 0x7, 0x0, 0x107, 0x4000, 0x3, 0x8f, 0xfffffffffffffff7, 0x1, 0x101, 0x8000, 0x81, 0x2, 0x1, 0x8, 0x1, 0xfffffffffffffffa, 0x8, 0x0, 0x80000000, 0xbbb, 0x7, 0x800, 0x9a, 0x4, 0x3, 0x5, 0x3, 0xef, 0x3, 0x8, 0x22e0, 0x9, 0x3ec, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x800, 0xf4, 0x7ff, 0x6, 0x8000, 0xffffffffffff0000, 0x1}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000000c0)) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') ioctl(r2, 0x8, &(0x7f0000000380)="8f05d71e63e7f160ea74debf30ae38501781f82143731587ed5034895138441cf0365f4a080b4a7e85f9a39cb7059af36959a90b763ea05bf9c47be0c6190ee5c48e54ebb78f37106dead1bb2e7c9a724ac369ad3b603d8d3554c767856d14a8097b00bf97a1495784cdef2a598fd6861c371e7d91e772c0c1cd00b4f6a5b3bafa988eb71df8695095b2e629914597aca6f0111da6177ef073d269d0c7f8156ffd1d7fa7a0993144bc87f1aa895869ef429c4620f67efa14f339d11a260e0a34af0b46fac2cd6c15ce7efe106527bc0fb1d9209c8134") ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) 20:30:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0xe}], 0x1) 20:30:32 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x80000000003, 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x130) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) openat$cgroup(r0, &(0x7f0000000600)='\x00\x00\x00\b\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000008c0)=""/248) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000180)={r4, r5/1000+10000}, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e20}}) r6 = accept4$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14, 0x80000) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x4, 0x4}, 0x8}}, 0x18) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10002800}, 0xc, &(0x7f0000000680)={&(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x3c}, 0x40) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000780)={@empty, 0x5a, r7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000001080)=ANY=[@ANYBLOB="00000000000000000400000000000000000000000000000000000080000000000000000000000000000000000000000000000010000000000000000000000000090000000400000000800000000000000300000000000000eb300000000000000900000000000000000000000000000000000000000000000000000000000000010000003f0000000080000000000000030000000000000004000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c0416ea7608edcc9283144000000000000000000000000ba1007f9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000f6ffffffffffffff00000020fa6a2d1e354463244c774cf930b53a62227c7479c47e763426fa8c95d04f3777bdff956f3f00000000000000000000000000000000aed7ae33f9a453f1049083b6d18793f6f3c9c8445cc246dbfa749e0d562d109ac416e697eaa48b8714457cef68a495a927d21eafeb7047eb5a5881d5fe414cf58a9d3deb8b0a6c6703411c2d482cf58c347ffea42276fc824a753bd0f6d949d07e2773c0ef6992c8aed390754eae028195d5ea6d0586dcd0441bb2fcf9574fbdd98ab5a78fb546067a43346fd8ccaab32e5fbda2ac3cbb499b4778a001c815edfa0a83d77ddaefab9de92cfec797099d7a6afa4e7ea580501df579fd490b47310506d3021ecbfde40b3b5f55b6a3dbb4bcabaeb29d9f876c6ee40b9e"]) clone(0x8020002110, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r8 = fcntl$getown(r3, 0x9) ptrace$setregs(0xd, r8, 0x6, &(0x7f00000009c0)="32a7532f6e2597079557198931ec043497f35ff6895299dbbb554af5cc9ab4401c296d8977d2bbd6e1db904bf0c60a18b8c578e8a23c30e6a16991a2f3222d4d8c9fdc5b39c829110d4dc557116f6586fbd95c38c6550d5eeb50fe2df528d0b842360840be3d7c1d79afd6f14749ebbff4b413b5e7cd5198937a14786e1f755dbfc2c748d1a61b3a9483cea007c2421194fb496b1539364d314727c6fe7a6036f864bebe6f1b6a8d0b972941f65146c780d99826e13e8f632a7b0d103203eaad95a3087276ae57e31050a1fa9c846aac85849dfbd39b3d43f293b87f49620621c0b3ce") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='\x01\x00', 0xffffffffffffffff}, 0x30) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f0000000280)) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000300)=0x8) shutdown(r6, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='syscall\x00') 20:30:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000cecffc), 0x4) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180), 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x5c, &(0x7f00000001c0)={&(0x7f0000000200)=@ipv6_deladdr={0x0, 0x15, 0x708, 0x70bd29, 0x25dfdbff, {0xa, 0x0, 0x80, 0xff, r4}, [@IFA_ADDRESS={0x0, 0x1, @remote}, @IFA_FLAGS={0x0, 0x8, 0x20}, @IFA_ADDRESS={0x0, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @IFA_LOCAL={0x0, 0x2, @ipv4={[], [], @multicast1}}, @IFA_LOCAL={0x0, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IFA_CACHEINFO={0x0, 0x6, {0x1000, 0xc8c, 0x9, 0x81}}, @IFA_FLAGS={0x0, 0x8, 0x55e}]}, 0xfffffffffffffc38}}, 0x0) 20:30:32 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') exit(0x292) sendfile(r0, r1, 0x0, 0x1) write$P9_RLERRORu(r1, &(0x7f0000000000)={0x18, 0x7, 0x1, {{0xb, '%self%wlan1'}, 0xffffffffffffffc1}}, 0x18) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/softnet_stat\x00') write$P9_RLERROR(r3, &(0x7f00000000c0)={0x9, 0x7, 0x2}, 0x9) 20:30:33 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setns(r0, 0x0) 20:30:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x88) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x17c, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x30}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x18}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xbf}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x3c}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}]}, 0x17c}, 0x1, 0x0, 0x0, 0x4081}, 0x4004) fchmodat(r2, &(0x7f0000000140)='./file0\x00', 0x14) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000340)) sendmmsg(r1, &(0x7f00000002c0), 0x4000000000000d7, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x12df, @mcast1, 0x4}, 0x1c) openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file1\x00', 0x0, 0x8}, 0x10) 20:30:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x800000400200) r3 = socket$inet(0x10, 0x4000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000220007031dfffd946f610500000000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:30:33 executing program 0: socket$inet6(0xa, 0x3, 0x7) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x11, &(0x7f0000000100)='net/softnet_stat\x00', 0xffffffffffffffff}, 0x30) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x1, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000001c0)=0x10001) ptrace$peekuser(0x3, r1, 0x400) syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) r3 = getpgid(0xffffffffffffffff) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='environ\x00') preadv(r4, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) setns(0xffffffffffffffff, 0x68000000) 20:30:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000280)="d937d39c288bae6fd2e97d56642f4a76d59478d199e46bef8524d9d964d2572a5a1bc869d679bf26bfd6d87275efa5e57cd2098fc079a3ea149159474e2fcc2f8360e29bb91f44963d2a1175b72a6b735de2e61193e6d2d87cf004ee35223a60", 0x60}], 0x1) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x2, 0x7fffffff, 0x10000, 0x7711, 0xe, 0x7, 0x0, 0x101, 0x6, 0x4, 0x0, 0xe323}) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f00000001c0)) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000240)={0x1, 0x0, 0x7fffffff}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 20:30:33 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000380)={0xe, 0x3f, {0x56, 0x8000, 0x5c, {0x9}, {0x8, 0x5}, @period={0x5b, 0x8, 0x100000000, 0x7fff, 0x101, {0xff, 0x9, 0x4, 0x1ff}, 0x1, &(0x7f0000000340)=[0x1]}}, {0x51, 0x6, 0x6, {0x2, 0x9}, {0x1, 0x8}, @cond=[{0x7d03, 0xb015, 0x3, 0x4, 0x6, 0xd28}, {0x44a, 0x2, 0x40, 0x4, 0x5, 0x2bf0}]}}) lseek(0xffffffffffffffff, 0x0, 0x0) poll(0x0, 0x0, 0x400007f) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x98, r4, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r2}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4010}, 0x4000810) getpeername$inet(r0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) socket$netlink(0x10, 0x3, 0x0) rt_sigpending(&(0x7f00000012c0), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) fcntl$setpipe(r5, 0x407, 0x8) clock_settime(0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 262.496532] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 262.546069] SELinux: policydb magic number 0x75622f2e does not match expected magic number 0xf97cff8c [ 262.633548] SELinux: failed to load policy 20:30:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, 0x0, 0x8000) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e24, 0x7fffffff, @mcast2, 0x6}, {0xa, 0x4e24, 0xffffffff, @local, 0x66c}, 0x7fff, [0x1000000000000000, 0x1, 0x6, 0xffffffffffffffff, 0x0, 0x200, 0x101, 0x3f]}, 0x5c) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) io_setup(0x10001, &(0x7f0000000440)=0x0) io_getevents(r4, 0x6035, 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)={0x77359400}) sendmmsg(r3, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) [ 262.803435] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 20:30:33 executing program 3: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x3ffffffe) 20:30:33 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0063404000000000000000000000000000000000000000000000000000000000000000004d4fd31e4106740af20000000000000400000000000000000000000000000000000000000000000000"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0x40046208, 0x0) 20:30:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:34 executing program 3: r0 = socket(0xa, 0xb, 0x3fffffffffff) r1 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) fallocate(r1, 0xfffffffffffffffd, 0xffff, 0xfe2a) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) sendfile(r0, r1, &(0x7f0000000080)=0x400, 0x10001) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) connect$unix(r2, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 20:30:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x88) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x17c, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x30}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x18}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xbf}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x3c}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}]}, 0x17c}, 0x1, 0x0, 0x0, 0x4081}, 0x4004) fchmodat(r2, &(0x7f0000000140)='./file0\x00', 0x14) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000340)) sendmmsg(r1, &(0x7f00000002c0), 0x4000000000000d7, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x12df, @mcast1, 0x4}, 0x1c) openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file1\x00', 0x0, 0x8}, 0x10) [ 263.101259] binder: 9349:9352 transaction failed 29189/-22, size 753233914437521229-288230376151711986 line 3012 [ 263.144089] binder: undelivered TRANSACTION_ERROR: 29189 [ 263.149880] kauditd_printk_skb: 228 callbacks suppressed [ 263.149887] audit: type=1400 audit(1549139434.127:21972): avc: denied { map } for pid=9354 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 263.162195] binder: 9349:9352 transaction failed 29189/-22, size 753233914437521229-288230376151711986 line 3012 [ 263.226963] SELinux: failed to load policy [ 263.270243] audit: type=1400 audit(1549139434.157:21973): avc: denied { map } for pid=9354 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 263.296117] binder: undelivered TRANSACTION_ERROR: 29189 20:30:34 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x7, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) getpgid(r1) r2 = getpgrp(0x0) getpgid(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r3, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000384, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x60a001, 0x0) ioctl$TIOCSCTTY(r4, 0x540e, 0xfffffffedffffffe) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000040), 0x4) r5 = syz_open_procfs(r2, 0x0) fsetxattr$security_smack_entry(r5, &(0x7f0000000480)='security.SMACK64EXEC\x00X\x88\xbf\xfe\x9e\xce\xd3\xcf\x80\xa4\"\x90x\x0fT', &(0x7f0000000440)='/{ev/ppp\x00', 0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r5, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x2, 0x101, 0x80, 0x7, 0x0, 0x65b, 0x80690, 0x4, 0x0, 0xd3, 0xfff, 0x2, 0x9, 0x7, 0x5896, 0x81, 0x2, 0x2, 0x9, 0x0, 0x400, 0x70, 0x7, 0x100, 0x9, 0x2, 0x81, 0x5, 0x9, 0xfffffffffffffc01, 0x0, 0x3, 0xc7, 0x40, 0xffffffffffffff01, 0x6, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x4}, 0x22, 0x31, 0x8001, 0xf, 0x9, 0x0, 0x20}, r1, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(r6, 0x0, 0xf6676adc) write$binfmt_misc(r6, &(0x7f00000000c0)=ANY=[], 0x7fffffff) 20:30:34 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00\x10\x00', 0x4002}) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x80800) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000480)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000400)='./file0/file0\x00', 0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x240, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cgroup.sXat\x00-s\xbe', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r1, 0x0, &(0x7f0000000500)=""/39}, 0xfffffffffffffe1d) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000002c0)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)) write$binfmt_elf32(r0, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0xfffffffffffffffa, 0xff, 0x8, 0x7f, 0x2, 0x6, 0x1491, 0x20, 0x38, 0x242, 0x6, 0x9, 0x20, 0x1, 0x5, 0x401, 0x3}, [{0x70000006, 0x80000001, 0x0, 0xffffffff80000000, 0xfffffffffffffffa, 0x3dd539cc, 0x3, 0x1f}], "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", [[], [], [], [], [], [], []]}, 0x854) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000180)) [ 263.403336] audit: type=1400 audit(1549139434.187:21974): avc: denied { map } for pid=9354 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:34 executing program 4: setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@known='com.apple.system.Security\x00', &(0x7f0000000180)='/dev/rtc0\x00', 0xa, 0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0xf, 0x5, 0x6c}}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x1010, r0, 0x0) write$selinux_access(r0, &(0x7f0000000080)={'system_u:object_r:logrotate_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x2}, 0x4a) [ 263.514374] audit: type=1400 audit(1549139434.187:21975): avc: denied { map } for pid=9354 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 263.632427] audit: type=1400 audit(1549139434.197:21976): avc: denied { map } for pid=9354 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:34 executing program 4: r0 = epoll_create1(0x0) r1 = socket(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xa000000c}) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0x30b8, 0x1, 0x40}, 0xc) [ 263.703538] audit: type=1400 audit(1549139434.197:21977): avc: denied { map } for pid=9356 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:34 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000380)={0xe, 0x3f, {0x56, 0x8000, 0x5c, {0x9}, {0x8, 0x5}, @period={0x5b, 0x8, 0x100000000, 0x7fff, 0x101, {0xff, 0x9, 0x4, 0x1ff}, 0x1, &(0x7f0000000340)=[0x1]}}, {0x51, 0x6, 0x6, {0x2, 0x9}, {0x1, 0x8}, @cond=[{0x7d03, 0xb015, 0x3, 0x4, 0x6, 0xd28}, {0x44a, 0x2, 0x40, 0x4, 0x5, 0x2bf0}]}}) lseek(0xffffffffffffffff, 0x0, 0x0) poll(0x0, 0x0, 0x400007f) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x98, r4, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r2}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4010}, 0x4000810) getpeername$inet(r0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) socket$netlink(0x10, 0x3, 0x0) rt_sigpending(&(0x7f00000012c0), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) fcntl$setpipe(r5, 0x407, 0x8) clock_settime(0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 263.743079] audit: type=1400 audit(1549139434.207:21978): avc: denied { map } for pid=9356 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 263.829754] SELinux: failed to load policy [ 263.835324] audit: type=1400 audit(1549139434.207:21979): avc: denied { map } for pid=9354 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 263.937706] audit: type=1400 audit(1549139434.327:21980): avc: denied { map } for pid=9368 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 264.030146] audit: type=1400 audit(1549139434.327:21981): avc: denied { map } for pid=9368 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip6_vti0\x00\xfb\xff\x04\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="6882706bf9ff45016e434899142ce7457163daa330b6c54e1d96593e996ca5ee27a55574a76d1b106dc9e723a74c5be53914abd2ca99e0fa03b5feeca1e73f354d5033893eba33d0fcd9b5eab13aae19facb4f75d599cfa9fa65f18eee86e4ede0cd76c79243f87af232c38d9238e33de44d5969eb57699fa20602372d1972af5240c0985ae7186334f0795d3e457364cee721122c704ba607bba1c9daed3ed1293d7dec2876bae92a6ae43751003bedf7bc81ca3bc896575aaab599cc2465ba2f29f9f9970dc2e47ba8f9bf745bb46e"]}) 20:30:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x7, 0x100000000000914, 0x6}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x400, 0x0, 0x800000000820000, r0}, 0x2c) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000180)}, 0x10) recvmsg(r1, &(0x7f0000001800)={&(0x7f00000002c0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/105, 0x68}, {&(0x7f0000000440)=""/40, 0x28}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/47, 0x2f}, {&(0x7f00000014c0)=""/104, 0x68}, {&(0x7f0000001540)=""/240, 0xf0}, {&(0x7f0000001640)=""/191, 0xbf}], 0x9, &(0x7f00000017c0)=""/12, 0xc}, 0x2000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001840)={'br\x05\x00\x00\x00\x00?\x00\x00\x00e_1\x00', r2}) 20:30:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') getdents64(r0, &(0x7f0000000200)=""/116, 0x74) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(r2, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) listen(r0, 0x7fff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000001bc0)={'syz', 0x0}, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f", 0x5e, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) setpgid(0x0, 0x0) 20:30:35 executing program 0: r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x20000802, &(0x7f0000000140)={0x2, 0x10004e23}, 0x68) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x20000000013, 0x0) 20:30:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$setflags(r0, 0x2, 0x1) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYRES64], &(0x7f0000000040)) 20:30:35 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) sched_getaffinity(r1, 0x8, &(0x7f0000000000)) write(r0, &(0x7f00000001c0)="3e38c7690def4017e527a723595e1abc18352771c3abde268d1cad90b0f6fb37d17ca2d80261a534cb8e124f157dfbcd971a56961057971cc20d51b8119037d5d9b3e0ae18d13859f4a1666d2c093fe87e75e257fabd76c05eed1df3c0199da68b4cc0fe87df95839b33ce7ad6ee40bea354057c4ea615df8b15dd5bc93ad82124f469c45279a01b342107fa490c76447a3e8f3153b255f69c4b1d5205c78340c481bc22319109d64244a1cc70227f228af2aa8f4b8e5efe4022d19b2a3ffe5b4824cf5d94d7c18e3877b3654c2162288377a5fe50af56", 0xd7) ptrace(0x4207, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) 20:30:35 executing program 3: ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x4000) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x8, 0x4000000}) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x2) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) unshare(0x40000000) 20:30:35 executing program 4: sync_file_range(0xffffffffffffffff, 0x5f5, 0xfffffffffffffffe, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xc) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x5) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000080)={0x800}) 20:30:35 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netlink\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$fou(0x0) accept4$unix(r1, &(0x7f00000001c0), &(0x7f0000000100)=0x6e, 0xe90aaedf0f62ebee) 20:30:35 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000380)={0xe, 0x3f, {0x56, 0x8000, 0x5c, {0x9}, {0x8, 0x5}, @period={0x5b, 0x8, 0x100000000, 0x7fff, 0x101, {0xff, 0x9, 0x4, 0x1ff}, 0x1, &(0x7f0000000340)=[0x1]}}, {0x51, 0x6, 0x6, {0x2, 0x9}, {0x1, 0x8}, @cond=[{0x7d03, 0xb015, 0x3, 0x4, 0x6, 0xd28}, {0x44a, 0x2, 0x40, 0x4, 0x5, 0x2bf0}]}}) lseek(0xffffffffffffffff, 0x0, 0x0) poll(0x0, 0x0, 0x400007f) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x98, r4, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r2}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4010}, 0x4000810) getpeername$inet(r0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) socket$netlink(0x10, 0x3, 0x0) rt_sigpending(&(0x7f00000012c0), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) fcntl$setpipe(r5, 0x407, 0x8) clock_settime(0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:30:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 264.685926] SELinux: failed to load policy 20:30:35 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e", 0x5a, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x10000000) prctl$PR_CAPBSET_READ(0x17, 0x0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 20:30:35 executing program 4: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000fea000)) 20:30:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x8, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000100)="dc1ab0028d70595ea6634e728a14c5e0f06764e34e40737e3a08d86fe8d5a80d5d97a69a5f5d4121ccd94e91da7679d2512df00ca8928bf4f0eecd968fb58578b4aa4cf49627b87a9084545fa46be7b73702e6350407fd976b59d32781055fd0c9ffe08548970f42ae6551a604e0646fefb67b0815bae376046eb16018ab965fb5ce847c9be0a030f1bd87c2f210822288d7ce55612bcf9577806e6d8e13089fa6d3b0de6db05f38c3542b4cb5ea0e17f93cba358c4963f85b0a5e46140b120926161b6c57d9dc30fb07bd8f409c0cd87ef12d42e8653e3713b40061b7b642a99e6ac370aa0588c6bde55e0d7a", &(0x7f0000000200)=""/135}, 0x18) seccomp(0x4, 0x80000000000, 0x0) r1 = getpid() tkill(r1, 0x25) 20:30:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="c2"], 0x1) tee(r0, r0, 0x80, 0x7) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000006980)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 20:30:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400700, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=@getlink={0x3c, 0x12, 0x60d, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bond={{0xc}, {0x4}}}]}, 0x3c}}, 0x0) 20:30:36 executing program 3: syz_emit_ethernet(0x1e, &(0x7f0000000140)={@broadcast, @local, [], {@can={0xc, {{0x0, 0x401, 0xff, 0x9}, 0x5, 0x1, 0x0, 0x0, "20d3a9e2998a7e46"}}}}, &(0x7f0000000180)={0x0, 0x3, [0x6fd, 0x1d, 0x24c, 0x107]}) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800490000300000000000009078ac141400ac1423bb070b047f000001000e0090780000000000000000000058bd5e778ab8dc54f1c05877a500000000000061d29e5889d3594bcf9afbab1ff5c985b9cf1d6935e8fdc937f7b83b06c9411d43d1f1bf3c5279531c3ef559482b5bde7cdccadab16298da1c86411ff86ac0a25a5d0c984354b8c44e4e25071bbc5c910c"], &(0x7f0000000100)) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000), 0x4) 20:30:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460106cd00ffffffff0000000003003f00060000003a82000038000000a2090000f700000045032000010005000800004000000000000000000100003f000000f8ffffff0181001f933f00228360ceb4bd354d000008090000ff94174c025f31a953837fd7b75ba4ccc7921e6bca3a5fa04aa907142646674e97d123cd650906f10f9b4312ee18e371d59bf7b6e20caff427f63008c40180e929a1e40f3c153a2508a40fc9ee5ddf45a62f0553053a0fb0c33d80310694ba9b9ea31b439600a74089bc9bf472546596d8cc39331b19269c82d933be9d2ffe6d146df10f16b45ec5793df5c4aaa1fa6a173c443f15f55bdeadf185c872d74f7148dc633c7f3a83c17e9ef19522577d3fc320d40e7ac29f7f5d792653630813"], 0x123) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000040)) 20:30:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000100)=""/246) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='/dev/ppp\x00', 0x9, 0x1) ioctl$PPPIOCSMRU1(r0, 0x4010744d, 0x0) 20:30:36 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000001c0), 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) getegid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0xfffffffffffffffe, 0x0) rt_sigaction(0x13, &(0x7f0000000400)={&(0x7f0000000380)="8f49a09923c48209a75800c421f16310c4c1175829420f8200000000c4228d8c2c82c4618968c4c4a1adfc9a0000010066d04a0bc4c2394667ce", {0x1}, 0x0, &(0x7f00000003c0)="44e670c423dd6bb00000000000410f5bd78f49f09301f20f7dd18f69c89208c442bd9c5899c40140c6b8000000000cc4e2791c7fab65f20f2aaa0b000000"}, &(0x7f00000004c0)={&(0x7f0000000440)="2666400f73d2c4f241e105467b00c481dde92d5b000000c442d9038fdf9300000ffeea460db8000000c42119f1d7470c00430f61fa", {}, 0x0, &(0x7f0000000480)="8fc9b092edf3410f70da8847d9fc650f1b62f440ff2bf2460f8c0a000000c4227d59580044dc7a99420f01ddc4e17973f400"}, 0x8, &(0x7f0000000500)) r2 = perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x10001, 0x0, 0xde4d, 0x0, 0xffff, 0x1, 0x7, 0x4, 0x0, 0x0, 0x6512dd2a, 0x0, 0x0, 0x10001, 0x7ec5, 0xb12, 0x9, 0xffffffffffff9a6a, 0x40, 0x6, 0x4, 0x60000000, 0x4b95, 0x5e, 0x2, 0x4, 0xfffffffffffff000, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x20, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x4, 0xd8}, 0x0, 0xf, r1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) write$nbd(r0, &(0x7f0000000540)={0x67446698, 0x0, 0x4, 0x4, 0x1, "c92bc4e75c79aa24a99c86d054fce02fc5b1c768f8fea168b3e32b43ddc0cdca35983d3bd2283be2a5ddf4b49c40f1da708d9b2ff0919e3ab6b827462b19594a58ee28a684d73218a0508b21e72169c31593d0252bc2f1fdb2b8ca65509bf4c931d8b7574ed86ff90ef0ebf26d11cd16e77ea95394649db9752a6d3fbd6bc0d078403f31fc59a43a6683ff82ca424fbd252c44164aabab8873d4ec985307"}, 0xae) pipe2(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) renameat2(r4, &(0x7f00000014c0)='./file0\x00', r3, &(0x7f0000001640)='./file0\x00', 0x1) bind$unix(r6, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e20}, 0x6e) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000001500)) fcntl$getflags(r2, 0x3) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b80), 0x0, 0x8000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="640000000000000000000001020000d3a8c146dc319695c9650d00020000000000000000000000000000000000000000010000000008d8d46f3ce4f58323245bed5d8768a220000000000000d902000000020000000000000020040000000700000000000000800100400007"], 0x6c) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000001580)) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000000280)) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x0) waitid(0x1, 0x0, &(0x7f0000001540), 0x80000003, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000002c0)) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000001bc0)={0x0, 0x0, 0x2, 0x3}) setsockopt$sock_int(r4, 0x1, 0x4, &(0x7f0000000600)=0x9, 0x4) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="153f62010000000000000016cded2b8e6bc44c2d4668626a") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) 20:30:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$PPPIOCGDEBUG(r0, 0x80047456, &(0x7f0000000040)) 20:30:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:36 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80000, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000100)) r3 = socket$packet(0x11, 0xa, 0x300) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r4 = dup(r0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r2) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f00000001c0)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000180)={0x5, 0xda, 0x3, 0xf3, 0x100000000}) r6 = socket(0x1a, 0x80005, 0x7f) bind$packet(r6, &(0x7f0000000000)={0x11, 0x17, r1, 0x1, 0x9, 0x6, @random="37e7e15715f7"}, 0x14) 20:30:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0xffffffffffffffff) chdir(&(0x7f0000000140)='./file0\x00') sched_getattr(r2, &(0x7f0000000080), 0x30, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000002c0)={0x2, &(0x7f00000000c0)=[{0x8000000b1, 0x0, 0x0, 0xffffffffffefffff}, {0x6, 0x8}]}, 0x10) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8000, 0x40) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000001c0)) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x400000000000365, 0x0) 20:30:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x800, 0x0) getpeername$netlink(r2, &(0x7f0000000600), &(0x7f0000000680)=0xc) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x5, 0x865, 0x100000000, 0x4, 0xffffffffffffffff, 0x8}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x1, 0x3, 0x3500000000, 0x4, r3, 0x1}, 0x2c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="7523cb248c0199e05141c5dcdd4ba40841ae218c5dca37c8ec2ac39a3c7531e6517b6ce55c2696c260539138cbec893e9e5994a628b04cdb8f52cea8d33d9ee9e2b2733fa98aff621b2f62709cbc8d76c33d7835859b8cf7b49df2c239210582c617fe3599c4599cc64f0b46826ad88bded26725fe2417ea3bb06f", 0x7b, 0x9}, {&(0x7f00000001c0)="2ff2b07b20bc2a6fe7dbd5ae285c01498e9b2622d39f52cee59c9ac7b950b3932dd99f1d62005e5836ef6ac6cf", 0x2d, 0x8}, {&(0x7f0000000300)="ea0fb833a53d421b76023867776ecef5229d738dd7fa33da9550567351939121b83b03561db335a7bdb9dad92233e89361e11f9acc50173fecdf3b9d4284e1a6344ce0717adf7140648fc72292a2881b5aa5aafde636f624aabcf506a81f84316c80978943ab12e152a1a0ad08f5b3dfcf9699b529a420850c4129ffe0bd8b6006fa3150090c41e1a76cb5a3c84606405be23b452152246e1e3e19d470fa019b9b8184a40731c6fee85d0c3bbde7a313ae94965a71a2a1a6d164ba8a6c2a814eae68b3bf8bc67c0fb33b833addc56c133029f361c78b40bcc1b6d62f35ed81f0172d95a961151dbd13679414fd", 0xed, 0x3}], 0x0, &(0x7f0000000500)={[{@fat=@flush='flush'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@fat=@sys_immutable='sys_immutable'}, {@shortname_winnt='shortname=winnt'}, {@utf8no='utf8=0'}, {@utf8no='utf8=0'}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@fowner_gt={'fowner>', r5}}, {@measure='measure'}, {@obj_role={'obj_role', 0x3d, ']*'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) 20:30:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0xfffffffffffffef8) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x3b, &(0x7f00000002c0)="b4b9", 0x2) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x62803) [ 266.126640] SELinux: failed to load policy [ 266.306513] FAT-fs (loop2): Unrecognized mount option "fowner=00000000004294967295" or missing value 20:30:37 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x9, &(0x7f0000000200)=0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2000003f) r2 = open(&(0x7f0000000000)='./bus\x00', 0x400000, 0x1) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) ioctl$RTC_UIE_ON(r2, 0x7003) 20:30:37 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x1, 0x1000, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000280), 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0x600) sendfile(r1, r2, 0x0, 0x10000) times(0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000300)={'caif0\x00', @remote}) clock_gettime(0x5, &(0x7f00000000c0)={0x0, 0x0}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x3) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000140)={{r4, r5/1000+30000}, {r6, r7/1000+30000}}, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpriority(0x1, 0x0) creat(0x0, 0x100) 20:30:37 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) creat(&(0x7f0000000700)='./file0/file0\x00', 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, 0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r3 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) preadv(r0, &(0x7f0000000380)=[{}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/157, 0x9d}, {&(0x7f0000000180)=""/61, 0x3d}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/129, 0x81}, {&(0x7f00000001c0)=""/11, 0xb}, {&(0x7f0000000200)=""/50, 0x32}], 0x8, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000080), 0x4) ioctl$KDENABIO(r5, 0x4b36) 20:30:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='sessionid\x00') ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000001c0)=""/159) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x44f) pread64(r0, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e) [ 266.805920] SELinux: failed to load policy 20:30:37 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RREADLINK(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="1000002e2f66696c654f920d709e243b428609d26f81de9f3301a32b442425f5ba9ac141aec110ceefcfaed66fb3e9e6ee13bc83d2f58bb2fcc3ffafff1f69aab03b843b20e5e2cd7247a2ceb369dcc7390b4049d7b075cbabf56967af20d64af0e53682552e1ccdd224eb783aa1e857f51fdafb5706c79ad904b7f2556c461813f186e3a1a7c66423cbbdea39651030940f325b36f4e883177d8d3eb3a59e986e5b42be779e9d"], 0x10) sendmsg$unix(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000100)="ea0d5125a14d44a74db366a363b5dad88ce69ff970436ff4fe799f5b53bd3c9f173c78610b445f9efa51c54e599dfb853ec5288d87c30dd38a164c7e76c21fddfe1c3322f9586ac67ef7eaaddd886950b8cc333e9f0f0d3918ee995ff20b3abe", 0x60}, {&(0x7f0000000180)="0097baba23e70910b369f98c87917eb7fd75c4d761900f7103d1857f7a5a6726fb78a31043ff9a2c6deddeed0b0a67b3dbd714fa6b6660d4078986438893d4", 0x3f}, {&(0x7f00000001c0)="2f7b7bc668dd", 0x6}, {&(0x7f0000000200)="930bfd88daef857848190708c835ad3f51e00332590e40633304cc8add9d022bd8b2ae7ba6150faf74565b00b757d6c645d969657cdaab51dba8dbb19feab3bc119d8e067b2faeee39026a756e689ad950ac6ec9c318ea492a00906e4da32a8f92752e7c090607f3e952405221bf37a3f3b49f7f55f69cef08024d22f2747e972a895a25df78d59aa15a920e71a455667ecc003e6761c64fce295c4025c93c6de8179a539854a4afa8", 0xa9}, {&(0x7f00000002c0)="f450ecc14c1e17f9e528d6241478e7884ee98ac40c8fb83303eefb98fa97bec823f0432e66d96fe0d47eb1a313872a0f0369e05fc77680384934bb93999459c1df61cf1457d9638d46093ee81fff12b7a9e8d841dd0299", 0x57}], 0x5, 0x0, 0x0, 0x4008000}, 0x1) write$P9_RSETATTR(r0, &(0x7f0000000400)={0x7, 0x1b, 0x2}, 0x7) dup2(r2, r1) 20:30:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) r2 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="ce3c300e162615", 0x7, 0x0) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="fbc5bc873ec57123b353163743b505af18aa48fe615e066e956314cab99aa0a2f4ff0140ed03c2bd1e52ac39c71b8ac8c5d961346f6bfbc9f17fe33272412a002402f36bd74d2e302fc0421ba0581942772078b11d036275056fa1a8c7a6b2e5faa698b2c0013f865905b1e9ea166a202f4ee05a63434b473f0fbd659e459b33", 0x80, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r3, r4}, &(0x7f0000000340)=""/108, 0x6c, &(0x7f00000004c0)={&(0x7f00000003c0)={'wp512-generic\x00'}, &(0x7f0000000400)="362c8d0bd5e775ec10765e6543d05e788a2c74797a26a2c388de0a00eb3f809f1053f12c8a6bf99eb6f6bda58b5278692533f1b019ea6264eeb94ec506b22083562b89b597e0df3ec1d444e725baedc3e08f41a1ced5cc5e712186e0fa9cab84e45ca9094ad105612f8d092c48ffc2e7bff90c7d25b4a8d5af808cd6f5d493c123b35e854a224c934d65ee4eb3", 0x8d}) ioctl$TCXONC(r1, 0x540a, 0x0) 20:30:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x123) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f00000000c0)={0x80000000, 0x6, 0x8, 0x6}) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)) 20:30:37 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x800000000105082) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x20000, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000300)={{0x398, 0xa00, 0xc7e, 0x2}, 'syz0\x00', 0x51}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x4000, 0x0) r4 = open(&(0x7f00000003c0)='./file0\x00', 0x101000, 0xa8) fcntl$dupfd(r2, 0x0, r2) pipe2(&(0x7f0000000400), 0x4000) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000000)={0x0, 0x4, 0x1000}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='eth0-(eth0:\x00', 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r5) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000380), &(0x7f0000000480)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280)='\x86\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x9, 0x0, 0x100000001, 0x4f, 0x0, 0x3, 0x80020, 0x0, 0x0, 0x9, 0x9, 0x3ff, 0x8, 0x19c, 0x1, 0x9, 0xfc18, 0xffffffffffffffff, 0x2, 0xff, 0x7f, 0x10000, 0x5, 0x7fff, 0x4, 0x0, 0x7, 0xce2f, 0x7fffffff, 0x0, 0x49759575, 0x800, 0x10001, 0x9, 0x2, 0x1f, 0x0, 0x6, 0x4, @perf_bp={0x0, 0x6}, 0x2, 0x401, 0x3, 0x0, 0x0, 0xe316, 0xffff}, r6, 0x5, r1, 0x1) sendfile(r0, r0, 0x0, 0x102000000) 20:30:38 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x101000, 0x0) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'syz_tun\x00', 0x100}) write$9p(r2, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r3, r3, 0x0, 0x7) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e23, @empty}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)='nr0\x00', 0x7, 0xfffffffffffffff7, 0x8001}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") pipe(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000140)=0x0) write$P9_RGETLOCK(r2, &(0x7f0000000180)={0x32, 0x37, 0x2, {0x0, 0x100000001, 0x265, r5, 0x14, ':\'mime_type--vmnet1%'}}, 0x32) 20:30:38 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x6) pipe2(0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000001c0)) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000240)={0x7, 0x7a, 0x1, 0x0, 0x0, [{r0, 0x0, 0xa5d9}]}) socket$packet(0x11, 0x3, 0x300) r3 = add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="2a6ae86b7bb8f83d8e5bc90f9a54475e495b388fad1ceed0bb90c27dced890f84603e60a0d5a36b7cb160f5ac223e4714568b3eb143f725c7ab2fde7f7dad67968c215d22d1c0618fcd214f687b48931fee87d99aeb79b3638a80b7cecddfe48116f70b5691690e31feb11c507b7a2fa5ba5719bceca5ccd4268b2dbf153c0", 0x7f, 0xfffffffffffffffa) keyctl$clear(0x7, r3) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') creat(0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:30:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:38 executing program 5: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f00000000c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_setup(0xff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x20000, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000100)=0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xff, 0x1, 0x0, 0x0, 0x17, 0x4, "76939ffe04f352347374f6e4d96b39b59ad0436fdfb99d1f397ea661f630e56a4f028fd8b204314ead2c5a6057d8eb7a9d7b2a06238cf723cba494ae26d611df", "59c9e206ef5ca41a858192da57abac2805fb68672b285a2815a46339f9859bfa6ae9997d9031b79d746084f29181e457265f1b36ffd6374d91b8137acb87cfdd", "85e4286b458952f8d89e74795d454fac360e8a088e50eca0afcbe1d0437a2605", [0x1f]}) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f00000002c0)=""/17, &(0x7f0000000300)=0x11) prctl$PR_SVE_GET_VL(0x33, 0x13d4e) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 20:30:38 executing program 0: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x5a) [ 267.646356] SELinux: policydb magic number 0x75622f2e does not match expected magic number 0xf97cff8c [ 267.719423] SELinux: failed to load policy 20:30:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4010010004002) io_setup(0x2, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 20:30:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000780)='/dev/keychord\x00', 0x10000, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000700)={0x9, 0x2, 0x7, 0x3, 0x0, 0x6, 0xba, 0x8, 0xffffffffffffff36, 0xffffffffffffffff, 0x74, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001dc0)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f0000001ec0)=0xe8) setsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000001f00)={@multicast2, @rand_addr=0xffffffff7fffffff, r4}, 0xc) write$P9_RXATTRWALK(r0, &(0x7f00000000c0)={0xf, 0x1f, 0x2, 0x1f}, 0xf) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x2880, 0x0) write$9p(r5, &(0x7f00000001c0)="99cf7dfd242202bb44f3e0d82ee7e6a60e7e41e6c346e592d59d75c8d11506e4e50cc89ec1c8acd42068908b4db82f92c4f21842ba761e947b4709d5d38d1fdb3ce62c6f3abb296a222762f6264bbe4257533730205378dcaa6ec8cd59dda083b3d32e4a5e60a9ccf8eda1f16b37eb71b3d3ec673e1a4b0fa78cde3190c74b00bf6beb2c1f9373445bb7a52ce58b36", 0x8f) readv(r3, &(0x7f0000000740)=[{&(0x7f00000007c0)=""/127, 0x7f}, {&(0x7f0000000840)=""/121, 0x79}, {&(0x7f00000008c0)=""/192, 0xc0}], 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$UI_GET_VERSION(r5, 0x8004552d, &(0x7f00000005c0)) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000600000000000000000008000300000000000000cd0d0000000000005742000000000000000000000000000000000000040000000000000000000000000000000004000005000000000000003f00000000000000f100000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)) write$P9_RREADLINK(r5, &(0x7f00000006c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000008000000000000001d0000000000000020000000000000005c050000000000000000000000000000000000000000000000000000000000000600000007000000020000000000000005000000000000000200000000000000fdffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b8dd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe5cd9b26e43a1982ef349e13e1b4b9555b371a2550f329e60dc03cdc43749f852a2d870c1c9f5b826bcd5c177bc3ded5412153c88e1dc6805ee63dfb003ffd532f43af788e4623ec4466141b06d854e211ac340322024a640d54356b0d781af028d9e9346ed86f1bd77de5c8096a8d673b7205a52baa26050"]) ioctl$PPPIOCGNPMODE(r5, 0xc008744c, &(0x7f0000000140)={0xc0fd, 0x3}) lsetxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@v2={0x5, 0x1, 0x11, 0x100, 0x35, "88d1cba87c9764f89408e14360766c0e9fb4bc365ed797c77a94f2f10693ba738bb5bdde49bd15e7f098c1655522dfea33b51b8597"}, 0x3f, 0x1) 20:30:38 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x401}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="080027bd7000ffdbdf250e00000004000100"], 0x1}}, 0xd30fada1e2ba9cd9) socket(0x7, 0x5, 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = fcntl$getown(r0, 0x9) syz_open_procfs(r3, &(0x7f0000000040)='fd/3\x00') setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)='security.SMACK64IPIN\x00', &(0x7f0000000540)='^vboxnet1^\x00', 0xb, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/checkreqprot\x00', 0xb41, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000ac0)={r2, &(0x7f0000000f80)="24df18166c0fc628688448574a5c90e4452a4e015be7e1e88ee92c6c7a016f86aa4f3ab18a23350b7112ad55311a0123b723e9a7a8c37f1bdf9445db5749d9ad784550ba4d24f9f5429a1f73e32933b11d5776c04fbbeb5ff660bc9c7413f527547686907e2474163e33505e5dd963e63171f4441be640fae2d65f40815d52a9118d090f104c0770ad5eabf1", 0x0, 0x3}, 0x20) unlink(&(0x7f0000000900)='./file0/file0\x00') r4 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000006c0)) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x48, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b48931f6ff6d"}) r5 = geteuid() r6 = getegid() fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x3}, [{0x2, 0x4, r5}], {0x4, 0x6}, [{0x8, 0x2, r6}], {}, {0x20, 0x4}}, 0x34, 0x3) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 20:30:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000040)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "b75e014a3f8744565c3a0f683713a299"}, 0x11, 0x2) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:38 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x40000100000003, &(0x7f0000000200)) ftruncate(0xffffffffffffffff, 0xbb3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x13, &(0x7f0000000000)='cpuacct.usage_user\x00'}, 0x30) syz_open_procfs(r1, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) rt_sigreturn() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06w=\xea\x8f\xe2\xa4\xe3\x85!M\xeb&') close(r3) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r3, r4, 0x0, 0x40000000009) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) time(&(0x7f00000000c0)) listen(r2, 0x2) 20:30:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = gettid() clone(0x2e828903, &(0x7f0000000080), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) 20:30:39 executing program 5: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101400, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14, 0x11, 0x2, {0x2, 0x2, 0x3}}, 0x14) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) [ 268.151119] kauditd_printk_skb: 347 callbacks suppressed [ 268.151166] audit: type=1400 audit(1549139439.137:22329): avc: denied { map } for pid=9657 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 268.164858] SELinux: failed to load policy 20:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001180)=ANY=[@ANYBLOB="3000000010000108000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b1f000900000000040000006c9f94b09113f07efec45ac5ce74529f0000"], 0x30}, 0x1, 0x0, 0x0, 0x1000000000}, 0x0) io_setup(0x72, &(0x7f0000000000)=0x0) r2 = dup2(r0, r0) io_cancel(r1, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, &(0x7f0000000100)="e00576b8eebf7cc10a9ac9dfa5a469496ede778053335cf71afed2ab34d7a40d4a832989d48db33bb372ca12c6935915a6125040b646d89372b80b4fd12e1d5c83a5ad398389453f98669fb4ef9ff25bdba34ad9450d3da4053dd2c921fd8f36835b13f23232f73f5185516c7ce691e4556fb2d0246a6f975b9af22f540aa137cd35b2e1dc99f927083bebb744cd3cb9b9fe23236d159839ee620df03e73ebfaceb7617b34562a529a1044e51217cadd2e0f47e2cd10a598934a49209ddb7aede43053b0ac4f97c1ff27e243d57bfaa32d1d6f46cd1ca2065c3ed37fe4df9a0b047d2e681b147606f594c5ce0ca6d714227bfb80717551e8fe15332414b623c1e3fb2856124260c5503a385a7203f65d5fe746d29b2a049d132f09e71ebf78d94470791302d8d86329e0fcba08401362f4ed97d81e6ae824de55199c77801ec53f2861fea869066459efc7bf8a5568fa22efb8dd6277eb0ccbd923606bc6ce27485d946106dab69eba22fbe630b5118dc58138ec087b232fe95eca1eaf93580b713c89335aac96a539d3e04279496747bfefcf0076ac5dfadfe284567c70b62f88728606f02a3f005d8f260937e65b20eaed4a41a48e0b15dc4e3c77e3c99499729d3352f92f7cd5c4f309d7a9d51f0bb2dbfd34762e1a91904069771817c529d22fec11522f10d139b82cf0f78e1ac04ac877813b51fb52a31dec03bfc8a1fec7a368ec8c3db883f231d3d301bf16726d5f5a977c596216672f7fec32838e8bb14a0eb877ba504c4ce857f37b80a471d63f0bf600c5225947a54b02e5156dda7ea5c97474ddc3ddd1f528a6c057a78e8e8f40720d64aeffbb0cf415121f6e49ff99a8a79cde39f5a794b8c905d4103d05c0dee79563d2d09c8cce2fbed5c25c10ef0b0d79bbb7d7a1b47091b208a8fe1dc17c407a3240095d4422b27097a6ebed6c28528abcecf5617f9774f66fcb91d3d24bcc132dcf443d30584706c61ddf7cfee07d749bce5c9b2ebbb95e75aee909256e58bc68c6d770b7225ee24b0dec4164bcdacd6f5623cc7cf8ad4454d07e27f6525a27ea69ff3346a86b64e389e878ac44acd865a49563e803ff1a89a5cf0e0e8636fd32d54bce3b5170af7cadfba2c11006e6141a613d497254682c27bca82091dcd519c0ac8b20683cd2168ba8ef05a7260b77cc17ed0d7458a9bc29905679263aeac5c6c1f2051a3d5de3188b8ab6e652b56d29fe39f4666618087dcd31456c43d1a17b4d24b07cd6887dae54ad7fd3e1bf6dc7fcb19847d66fd138b749a8c8297762df952cbb50e712d0cee8267fbf25aa819799f92404ad07d991c9daa5498bca75c9b8ce85e0023ac49714ef673452a7c9cc8967391689fd1853e260b4eae8f998cbb7ba664c6a4db6811f269359c804530dffaa51f99ca84992cddc106432872a6a360651d2751dfa8458f1aefc438467ebc78e5a50df51bf0473d6c3ede83be37a81e3a05fe7c8af23186d4261806579089a3fd813fb46ce885fd6a0f5873501a5aba2a6c18a6b2e56f9eb9532e30be5eafa64b8115fcbecd7d6716786e27806ca7035da1033204bbbf134bf65b278a249b8f3c5d81cfd745586eae44e62ac1784902eb9e098eaa6932e1840fee3fe21eec7357ca3f7572cef8593b876d4a6e2c70fa1fd9b2cebddacb65d121c3c073b3fb18b5561103fb95f5c7867f1cd8a588153a6ed3a16cd76229163824de669036b704c864ee5d74a019cd4cd4ec9b67a9a69163568d55ec07464d26bc164a3b06f6c6b2bf7fe73f6b49ee1a3d3d4fb445d6b44cd036a334f3480390463eeef7420cbb59dc6c9e5e88c572b3c7b0f7053ac29f7e7a257a66e9f8072b7406284093f16af9e5abd5d77992c3edb9a1ee92c5178516136f54653bbcac3927ac3f68c2472279b5305df3cad7ef03def5ace75e51e410d23754254d54f83b5135e471c9c2e5839d92bbcc61bc900bbf562e44eee17f445368798aa6ff747fbeb3577c679c2daa00e49c511623c4fa91cd3fdbfce7ae89db9760de2d5df8a3bdf814c73f9b41d155645e9156e032f834d0602cefd32b6a593bff35744e9135ebaa63bb357ba470c54521e4b4353d7cfc51e88e5509020c85dd663869eaf1ca7ae0e367d764c025d0cd8a69778be0c9b9539c683459b27bc120ace41dedb1da1c87e5692de5690487b0b43c5190f25838f2d64b82cee5195a0008d7cfd7bbf608f22d93ddd13620e709f70fa51ff355ca03afa4fc1f97cfb09a773de96bfbf98a39e71f72bfcc94bfede3fd92097db28c501ed60c22bc4fa11710063959e2dec8074c1b93c737891ed743546c8ac13719e4f41c29e7fceb720a2dadfdf880b623c5bdcede82def07417d56200945973d8221361d711c689b2b79771c0b4dd1828d27b8e8b93332f9fd8563e5b94646111e588717e32f8f2e497690a407a2c29536c6a94c87f0f88ec1903348dd2fce62c166bebf44857328a53ef9b2795c93d5b3c44076ad860dc4c0b403530c3268937c55f0fe8d184a9d8af8b5534dd5d128d79d740634d1f189cd52c32e9e56420f6e52d6d7e58443ca5f498166567c91736af931d02879759f7b774b8f18d1490e29459d74a6f349cbe3cf60e55e236af7c144eb69bc2d2474f97c9d287d7762936c9ee3cf6270cacdb6312e74595a9c3e17b4750d2c78c88ac3f65a8cbbc0dba8fcf1c76de3345b1ae994e3d4c73a6353d3225881d94d1e28757e19740c1d63a68025872d653a8f26fd87d112ebcdd8120079ad5b9098b7bca10ab6249afb8bc1dc5b9d9e07fa40566e40d938343cfb5970667524453c696959063dab6d085eb7f81b1497637b362e165a3ba240252bb997392c37811f2582716b505ceec906afa8b1830ef19524c73ace97d832976e4814c9c9eab2aa2ea0e3730e24567d591f2eda6c7238ea768449c1a90817b2b5fdb5aa062d912d91981c7d94c5ba2d4c5792f2de81604942d276defeea3f3579f81c60c314c0a85155a38a66d8a36abe003087c73105e4e9377ec8bd7b039a182b11c331c225f3b845d8faf747837fde2c6c7b6da1fc7d0e688b517257087a206acbd52fa4814542cbba598e34d3fc97038ecd711a7b554927d0e85db033cbb60745f21cb22a2e868d053c61f1aac6f59d13eeda70865492c82ea16d4bc3c7e80c359e15d9117f8c2ecba387a1e447ad99a8b22913a313f48a0c34e51c34796a9a13d408fcc5538377ab6d7b45e8d863aedbce569e53eabb50fbe9885baac04b93d761993c41238e214c9eb3501e78a88ca09ce0ad1a42d87717731816c6181290e5d726f362307938147c098738e5147663736a4bb2055637d6162f0d224e02ff1bd2698b086e0e028679310a1da7c9f54e0d5e512c0b46dc4e59ddb3ad7592969ea48efb02f66db78941f75cd246a9877ee79a174669bd188e5a604dc315f249269e4c961b711d89e0d6e18b2852884ab06849d598cb10269b1a3eec573ef3584779372e47a0c942a46d11da28955e22a628c17f23f4fb3cbf33b1bb4c46040c5289fc06e84fdf56be882e290b9e70e4fdfd0bf80d6d9975c2ae784edc489b81bc01330260c23c690825a8f13a981febc09a026e37557980ff7c7f6612c0ea64278829e7370aa75c5bb10d2256358228ee74ffa036827afc6225d7e88d1ad218f315c025e983ac327d541f861e25d00aacfa6f8a6e995f90934f1f4aad639fabaf90aaec6ad887c7a326721ed728feabb09ee15a202c3549d01d5163a28bf0ddbf17f811fc5aac29505c7d33300795c1710a16c6e6787bb678334a0e0e87435f3284152c45d801da9523201b7b0f6d843b0420acdf5d439368dfc120c1a14aa5ab747c0a7ee921b4b001f2e256163f23e00faa3d1231d8470b62e9157541c06fe6d7eae672db3ad436b67a343a2b737188bf2bf884f6b86aa731df36a42c093bb92ca28d3e503854cf50e24b4a734c2a4f2d1bae57a9ea0c5265d6dcbdf09f64dddd4d2c9dbde37ebd616e292c085efd5201f8b03bcad3d5fdc8fdd1ea3f41b7c6044e1120c3b146a0e9c7bc303bb37bcb1c286439dd0db867637153ff89c0e3deb4f635ddf2100bfd0e94082210117a79062ffed7252983b02b821cde22bcd50c4adb237eaf4e81e7846e70dc4b18907a9fc41254d4d2c39d6872444c43977b9997fd79f65fb18f3382bb82f423fea7d39cd0c7329b10d8f0c53142697e0f8957a590281bee5fc90d9ae9dec88a9799b209c5a916c5c56f0d8db5a058e9acddc86e0aac347fe8628902bebb5c1fc93e5780ef315030f3c92e97043e4a2d74990fd4554669a280984188bc08882c77baa403023a584f77d36e0d3d3a8a3ecb94a3875c634e21ec8e7a633fff721b13468d9e5c702099f9a2b26e1cbb703114b1864e08e1001b20925e2cf2096f5a233fb5d1fc5c7eba3873f41937a404ccbc6f7cfe1e8927764716dd1055abeb1f74807de1232d8b577210887d75a7c90c753903a3ed66097e828435be4ed952604aab4a0beb12a6f8acb0a7be6cfb8aae630ca63bc5ae9600075018bdee91691d4d437509226c1356f044df53cc68e694cead377e893ba0b962b3ff63e3086b6729bf2739ffb055503730e65efd8c6ab86856b1aa1bc103c2ef15cc8ac1e6a7edab1ee7df34f125af366195d411cd43a07efbc36cac340a520a89ec4eb2804db7b2b09e2f8135a3ac35e87702a97daad3d2222e200e8024790327d561f09450c961aba34ec46e942669f8f06379b440328bf91e7885cf4c5b6d30592ca357e6e3a39d70b2468cd7b885c8c33e6296357996dd6b575e3bacb70e08c4d765821750f60c9d98ad76331283997bb4ec139b8b84515dcb0dc0eb6ed62f71f7a7a2af270ac73afc542931dc54804d328f3818941810af981c0bd5573f4c9a6e7b9c373e292f28cfa0fe8ba3b86fb48a10ee1a29002cf86b3eff5e2361ee52745cef79f80f48b3667c6060c93d13df8180c12a273d3609035c7e5fa4d11eb454cedad78349e2f676bd6f96d6868c7e3fce0d293f6844b5e4592b50d63f6ae3505605f0414751989434decf1a2afb4f1d911cff5c4109552e589c230276428261e17107426c842cf4ca2446eae811b58a01487dfda72a1aaefaf8ed7d88f3fbaf1fd5d30a71e2790da9d6ff40249cc75d6aed845b7db272c6f8b02e5850c6507f46ebc3ad343ae16e91b78a238b7c160111efc0e3e49993f9fcfb9820a1fdfdbbb35e2eaed111f0ba3b2e59e411889e8db217d3c4d8911642dd5444516eb2ac3f3cff933bd3cde2abf59bc50eca3366d1137f68f3aea62d4759c875d3b9967f0935fc0d8ea97e0d1b99ca57d134e96bc81b25fbee3112eca0cd85dfe24d73d22d5bd32275d28842f41503770c5478dd215059883b8ff01ebb2453709e269f496cd0382b7682dd4dd7506c81401a1ebeafb93d9abfee7ecf21cfd49832ce2a5e3225fc84291c694355dfadec5a335da180ed4b2a6f981d2f47b6cee63500b59b7670a936281b8e0a4e9f1fa824de1ec70c7c62755206354e2641b4280ac910eb7adeb8a5360b1be2f4fc9b5c6440c8c9fafcf0bf95cf625befeeb6308e4b60dd069562b9228f88e757679122011892617670f491b9a7ef8976898789c6146ab441e499fb776149435ccfb50dc91a32f00ed6727929193f2441e7a152d4168f0bcb542ad05fff4b3fdabe8cdaf86c354a6c1cd18891e007491bdb84382d01a5e1126aca4d06b66c0e41cafe6233639aa6626673673a8681215e00ea5ab659eee758be8797b26ab8bfbfbab0f6280dda295a5aea622b", 0x1000, 0x3, 0x0, 0x2, r2}, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x14) 20:30:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x0, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 268.289550] binder: 9639:9666 transaction failed 29189/-22, size 24-8 line 3012 [ 268.322069] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 268.345939] audit: type=1400 audit(1549139439.177:22330): avc: denied { map } for pid=9657 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 268.492172] audit: type=1400 audit(1549139439.217:22331): avc: denied { map } for pid=9657 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:39 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x6, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x229d7) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) [ 268.643339] audit: type=1400 audit(1549139439.217:22332): avc: denied { map } for pid=9657 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 268.707735] audit: type=1400 audit(1549139439.217:22333): avc: denied { map } for pid=9657 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 268.711697] SELinux: failed to load policy [ 268.733299] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 20:30:39 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)=0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e22}, {0x2, 0x4e1f, @loopback}, {0x2, 0x4e25, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x17d, 0x8, 0x5, 0x46a, 0x0, 0x0, 0x0, 0x1}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x50000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000a40)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, 0x0) setxattr$security_capability(&(0x7f0000000a80)='./file0/file0\x00', 0x0, &(0x7f0000000800)=@v3={0x3000000, [{0x1, 0x5}, {0xfffffffffffffffe, 0x6}], r3}, 0x18, 0x3) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000c00)={'filter\x00'}, &(0x7f0000000480)=0x78) r4 = getpgrp(0x0) getpriority(0x0, r4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000780)) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000007c0)=""/36) openat$uhid(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/uhid\x00', 0x802, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000380), &(0x7f00000003c0)=0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, r2, 0x0) mprotect(&(0x7f00003a3000/0x3000)=nil, 0x3000, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) pipe2(&(0x7f0000000400), 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:30:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90x0, @empty, @initdev}, &(0x7f0000001b40)=0xc) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000340)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001b80)={@dev={0xfe, 0x80, [], 0xd}, 0x63, r4}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001ec0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a80)={&(0x7f0000001bc0)={0x2e0, r5, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe2}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4b5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2345ddf7}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdfa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x14c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @empty, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xce}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) sendmsg$nl_route(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=@ipv6_getnetconf={0x4c, 0x52, 0x301, 0x70bd29, 0x25dfdbfc, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x9}, @NETCONFA_FORWARDING={0x8, 0x2, 0xfffffffffffffff8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xc77e}, @NETCONFA_IFINDEX={0x8, 0x1, r4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) poll(&(0x7f0000000380)=[{r2, 0x100}, {r2, 0x400}, {r1, 0x40}, {r3, 0x2168}, {r2, 0xc201}], 0x5, 0x6) preadv(r2, &(0x7f0000000880)=[{&(0x7f0000000100)=""/45}, {&(0x7f0000000140)=""/198}, {&(0x7f0000000240)=""/233, 0xfffffffffffffdf6}, {&(0x7f0000000600)=""/250, 0xfffffffffffffe02}, {&(0x7f0000000b40)=""/4096}, {&(0x7f0000000940)=""/151}, {&(0x7f0000000700)=""/135}, {&(0x7f00000007c0)=""/176}, {&(0x7f0000003bc0)=""/4096}], 0x0, 0x2000107c) [ 268.829848] SELinux: Context system is not valid (left unmapped). [ 268.843937] audit: type=1400 audit(1549139439.227:22334): avc: denied { map } for pid=9657 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) fsync(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='statm\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 268.980884] audit: type=1400 audit(1549139439.237:22335): avc: denied { map } for pid=9660 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 269.002409] binder: 9639:9704 transaction failed 29189/-22, size 24-8 line 3012 20:30:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/unix\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="4800001f", @ANYRES16=0x0, @ANYBLOB="000000000000000000000a0000002400040014000700080002000000000008000200000000000c00010073797a3000000000040005000c0005000800010065746800"], 0x48}, 0x1, 0x0, 0x0, 0x8004}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000400)="357f2f1ad76d0cbbcda95667196825abcb23c9597f1362a9c80975885e595fe2d7c563bd5b339400b525a4bd3cb130e2da04e92dbaa09eae64e2d16000e30dfd2f7aaf376ab512933321e274f0439cd5959f5568b5e18b25a23289779a8b06170fb8846c19918c0bcf5bad5a6e25b68258a23368c3c90a7aba079a7ece8047b2c1c134a252a6ab7eca19a93986590fb252fe3a2f773afdba40abe8ec2f332439f49cbe0ae93d80f936e5747eda933307eccc60b1f518491129e536", 0xbb, 0x40, &(0x7f00000002c0)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) write$P9_RFSYNC(r1, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000028bd7000ffdbdf2515000000a800010038000400200001000a004e23000000008c9488dac904c4b3331ca6bd26ec7a5a493800001400020002004e24e0000001000000000000000044000400200001000a004e2400005fc7fe8000000000000000000000000000bb07000000200002000a004e20000000058fde154938d33bed593e0dd33c1fee9ccf1e055b100001007564703a73797a310000000008000300ef8a00001000010069623a766574683000000000"], 0xbc}, 0x1, 0x0, 0x0, 0x4}, 0x1) sendmsg$TIPC_NL_MEDIA_GET(r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) shutdown(r1, 0x0) [ 269.035363] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.039158] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.048104] audit: audit_backlog=65 > audit_backlog_limit=64 20:30:40 executing program 3: socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev, 0x1000}, 0x0, [0xfffffffffffffff9, 0x824d, 0x0, 0xc7, 0x0, 0x0, 0x5, 0x8]}, 0x5c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0xd4}, 0x40000) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) write$selinux_load(r2, &(0x7f00000001c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340), 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x2c8d8c6e) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{}]}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x9, @rand_addr="a070105530f76e9f6e391f35a6a83281", 0xff}, {0xa, 0x4e22, 0x7ffd, @empty}, 0x0, [0xfffffffffffffffe, 0x0, 0x0, 0x66, 0x0, 0x0, 0x6a9]}, 0x5c) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast1}, @icmp=@address_reply}}}}, 0x0) 20:30:40 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@broadcast, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) bind(r0, &(0x7f00000001c0)=@in6={0xa, 0x4e23, 0x10000, @remote, 0x5}, 0x80) setsockopt$inet6_int(r0, 0x29, 0x33, 0x0, 0x0) 20:30:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r1 = geteuid() setreuid(r1, 0x0) setreuid(r1, r1) geteuid() 20:30:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x0, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:40 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) fchownat(r0, &(0x7f0000000080)='./file0\x00', r1, r2, 0x400) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x810) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x44) setsockopt(r0, 0xffffffffffff8001, 0x7, &(0x7f0000000300)="1177beab75a2e5c83fd991f6d4f4e66d753e34b4470058ba053a5d6ce5a2d46faccc756515b928b4c17cafd01b3f93d8d62f826b0f7fb054a0d9b8641116f7fbbbdbd779ec4e0cea9311a1e9fd04c619c75fe16bc6a6d9ef8942bafbfc80e2fd345e37648a6d4dc42b1aeebcbb760be4a119c101387fde30d4a589ba36e9ba5c", 0x80) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000380)={0x8000, 0x8001, 0x3, 0x0, 0x0, [{r0, 0x0, 0x1}, {r0, 0x0, 0x2}, {r0, 0x0, 0x7}]}) write$selinux_user(r0, &(0x7f0000000400)={'system_u:object_r:dri_device_t:s0', 0x20, 'root\x00'}, 0x27) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x9d) tee(r0, r0, 0x63bc, 0x2) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ashmem\x00', 0x240080, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000480)={0x7, 0x1}) write(r0, &(0x7f00000004c0)="8bf025817635edd8a9df18f5b1c4569de4062c27fbfe5be89fd8c91eeccc61b0ebd9ebc50348d4d96321ccdb148c8e15db908be71306d38d17a0b0f56e3c7dd160ec83271367afe9d97c03905c395014de7570a0bf64057fbee2b6052d1e46e67dc9643393849629bf095fa28e5b906d9ae9ca5e", 0x74) fdatasync(r0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000540)=""/67) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000005c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r0, 0x28, &(0x7f0000000600)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={r4, 0x5, 0x10}, 0xc) write$binfmt_misc(r3, &(0x7f00000006c0)={'syz0', "141e935f0e9c0ab0bdccb4b41b7383797ec93155fbe88904b086505c01444fdcb2a010344226d25ba999ab72521727aeb7ba9bafd1b52a004f034adc48be3f330aece672c4217342e06f678bf1a8e256c26d9fe2485b645cd817e4f4dc5048a1d284283c2ad953c40913b7ad49a5ea0b76edc31a884dadf7756ff64b1ce2e49ce3fd2b53600c4483e326008cfa4cc5a825df6e954e1ee9599b12e10ab26a570d35a33a3405e30ebf3358a352626b38a340510c8ed5c388564fd7403db5285d3701fecc48136e78d56c5e9cb7518a"}, 0xd2) chdir(&(0x7f00000007c0)='./file0\x00') getsockopt$netlink(r3, 0x10e, 0x5, &(0x7f0000000800)=""/187, &(0x7f00000008c0)=0xbb) signalfd4(r5, &(0x7f0000000900)={0x140}, 0x8, 0x800) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000940)={@dev}, &(0x7f0000000980)=0x14) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000009c0)={0x5, 0x7fff, 0xfff, 0x2, 0xfff}) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000a00)) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000a40)=""/240) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001b40)={r0, &(0x7f0000000b40)="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"}, 0x10) 20:30:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0x0, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000028000008500000000000000956e548118726c6c211d5e558bc23d159fd7ecec651947e90fe131d1bca535239132139385cb74f4897e5e45c337da1788b18dc812d39fc4aa30f076cad19d00000000"], 0x0}, 0x48) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x143000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getdents(r1, 0x0, 0xad) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000003bc0)=""/4096, &(0x7f0000002540)=0xfffffffffffffd74) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x16, 0xfffffffffffffffb, 0x5, 0xfffffffffffffffa, 0x14}, 0x2c) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) splice(r2, &(0x7f00000025c0), 0xffffffffffffffff, &(0x7f0000002640), 0xb33, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$9p(r3, &(0x7f0000001540)="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", 0x1000) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000014c0), 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) mkdirat(r4, &(0x7f00000004c0)='./file0/file0\x00', 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000580)) ptrace(0x10, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) wait4(0x0, &(0x7f00000003c0), 0x200000000000, &(0x7f0000000300)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000001440)}, 0xffffffffffffff76) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000000c0)) set_tid_address(&(0x7f0000000240)) 20:30:40 executing program 5: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) clock_gettime(0x0, &(0x7f0000007c40)) recvmmsg(r2, &(0x7f0000007a40)=[{{&(0x7f0000002780)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}, {{&(0x7f0000003980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000003a00)=""/33, 0x21}, {&(0x7f0000003a40)=""/146, 0x92}, {&(0x7f0000003b00)=""/84, 0x54}, {&(0x7f0000003b80)=""/85, 0x55}, {&(0x7f0000003c00)=""/235, 0xeb}, {&(0x7f0000003d00)=""/213, 0xd5}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000004e00)=""/47, 0x2f}], 0x8, &(0x7f0000004ec0)=""/54, 0x36}, 0x8}, {{0x0, 0x0, &(0x7f0000007540)=[{&(0x7f0000006100)=""/162, 0xa2}], 0x1}}], 0x3, 0x40010002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x4e22, 0x0, 0x80000002}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) [ 269.789305] SELinux: failed to load policy 20:30:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x0, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:40 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000080)='/', 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400000, 0x0) getpeername$unix(r1, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) sendfile(r0, r0, &(0x7f00000000c0), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) write$selinux_create(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2f7573722f6c69622f74656c6e2d630eae8415c8b674e8a06c4b1e5350e5836f6ef6d76f6c2d35202f7362696e2f6468636c69656e7420303030303030303030303030303030303030303800000000000000000000"], 0x49) sendmsg$nl_route(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xd0c08100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@getnetconf={0x14, 0x52, 0x20, 0x70bd25, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8000) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x24000, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x204}, {r0, 0x5}], 0x2, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000140)={0x7}, 0x8) 20:30:41 executing program 4: futex(0x0, 0x89, 0x1, 0x0, &(0x7f0000000080), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init() fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f00000001c0)='$\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r2, 0x0, 0x0, &(0x7f0000000240)='#\x00'}, 0x30) fstat(r1, &(0x7f00000005c0)) fstat(r5, 0x0) fchown(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x68) getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x7080, 0x8, 0x7fff, 0x1, 0x3f, 0xc27, 0x2, 0x0, 0x1, 0x80000000, 0x0, 0x7, 0x5, 0x2, 0x9, 0x40, 0x0, 0x0, 0x9, 0x400, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x9, 0xff, 0x40, 0x1, 0x7f, 0x0, 0x0, 0x1, @perf_config_ext={0x7}, 0x428, 0x0, 0x3e, 0xd, 0x9, 0x20, 0x3}, 0x0, 0x10, r2, 0x2) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x480000, 0x0) fcntl$getflags(r6, 0xd74f129564594454) write$ppp(r2, &(0x7f00000004c0)="98091ed273283887f16d9ae433698cc6c3eb186a4b918e39d82b7a01a807f6ea2edea8c1d2178071cf9390ba670d3209347a8d3790a304bc57bc7b60d48fce2f6400aca8df387b50", 0x48) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000280)={0x0, 0x100000001}) 20:30:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x4000, 0x0) r0 = epoll_create(0x3fe) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x2711}, 0x80) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x5) r2 = inotify_init() lsetxattr$security_evm(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f4dee10a89fb1bb901120000000006002f56e6819b1252738b0268700500c196a8faaff20e407872e212022d000000"], 0x39, 0x2) inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x80) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[], 0x2e7) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400)={0x0}, 0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000200)=0x9) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="000429bd7000fb5bdf25010000000000000007410000004c00180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x804) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x2) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r3, r3, &(0x7f00000000c0), 0xa198) syz_open_procfs(r4, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400", 0x22}], 0x1}, 0x0) r5 = epoll_create1(0x0) r6 = epoll_create1(0x0) r7 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f00000001c0)={'team0\x00'}) sendto$packet(r7, &(0x7f0000000100)="3454b6a5c98094cf1e679f6dbb2ae61989cbb62e4be660ad3c75e024e9efaf4178785a6afb4bef9988caa0b84cc66affbab05f7463252b541a59fcec6eb77ca3e924302f3bf7e522ab3d9e6406", 0x4d, 0x0, 0x0, 0x0) close(r5) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000080)) [ 270.447176] SELinux: failed to load policy 20:30:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2000, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$inet(0x2, 0x803, 0x1) getsockopt(r2, 0x0, 0xd, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0xa6) 20:30:41 executing program 5: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCDELDLCI(r1, 0x8982, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000100)=""/106) ptrace(0x10, r0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:30:41 executing program 2: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x6000000) r1 = getuid() getgroups(0x5, &(0x7f00000000c0)=[0x0, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00]) chown(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r1, r2) pipe2(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x94}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) r5 = syz_open_procfs(r4, &(0x7f0000000200)='smaps\x00') preadv(r5, &(0x7f0000000480), 0x1000000000000268, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xfffffffe) r6 = creat(0x0, 0x0) geteuid() getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000), 0x0) fchown(r3, 0x0, 0x0) r7 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) inotify_init() getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) fallocate(r6, 0x0, 0x45a, 0x5) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2a) ioctl$sock_SIOCINQ(r7, 0x541b, &(0x7f0000000240)) [ 270.751105] SELinux: failed to load policy 20:30:41 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80284504, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) socket$inet_tcp(0x2, 0x1, 0x0) futex(0x0, 0x89, 0x0, 0x0, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r5, r4, 0x0, 0x0, &(0x7f0000000240)='#\x00'}, 0x30) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x20000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000300)) fsetxattr$security_capability(r4, &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x20, 0x1}, {0x101}]}, 0x14, 0x1) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x51) getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x7fffffff, 0x401, 0x1, 0x4, 0x0, 0x100, 0x5106, 0x8, 0x7fff, 0x1, 0x3f, 0x100000000, 0x2, 0x0, 0x1, 0x80000000, 0x0, 0x7, 0x5, 0x2, 0x9, 0x40, 0x5, 0x4, 0x9, 0x200, 0x3, 0xb775, 0x2, 0x2, 0x100000000, 0x9, 0xff, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7}, 0x0, 0x5, 0x3e, 0xd, 0x9, 0x20, 0x3}, 0x0, 0x10, r4, 0x2) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000480)='tls\x00', 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000002bc0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ff000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff00000000ff000000ff00000000000000ff00000000ffff1000ff00000076657468305f746f5f687372000000006970365f76746930000000000000000000000000000000000000aa49e9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002100090700000000000000000000000000000000f00020010000000000000000000000000000000000000200000000002800727066696c746572000000000000000000040000000000000000000000000f00000000000000001ccae8243d5213dee85d149ecadb7733000000000000000000000000000000000000000281d008090100000104000000070000000000000000000000000000000000000000000000000017d8f2c17da46c202cdf5ba60000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000bb407cdc922c2f913273cf518257ed41f3c9467eaf76352f8e61cf53ebaed48d3e19a1d719e00ea83b3e7245b1e69037126d35821ec84c68f7a6b061acc2ea01"], 0x1) write$ppp(r4, &(0x7f00000004c0)="98091ed273283887f16d9ae433698cc6c3eb186a4b918e39d82b7a01a807f6ea2edea8c1d2178071cf9390ba670d3209347a8d3790a304bc57bc7b60d48fce2f6400aca8df387b50baeeefba631f356cff8d8be7e268157283e217602139533dee39f01fb299138b235e3d8ff39809794cdae64ce348db10287f90a137342604a6b3a21064a44b4e46cc226eab7a271d", 0x90) ioctl$FITRIM(r4, 0xc0185879, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000100), 0x4) sendto(0xffffffffffffffff, &(0x7f0000000000)="3bf87f57b4f0c17f1a1d519120d159ad7733acc5d0fa382560259c303d087542ad9bcee7bf24347ca71a8751cc8375e8d969fc03f157894a423da4c1f55c060756c06c626985a082f52e347a8b878865a049da0f101945f32b95a05520963db9", 0x60, 0x4, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/242, 0xf2}, {&(0x7f0000000100)=""/184, 0xb8}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x4, 0x0) 20:30:42 executing program 2: r0 = dup(0xffffffffffffffff) accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000100)={@local, r1}, 0x14) r2 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000005c0)={'hwsim0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES64=r2, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x3}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 20:30:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip6erspan0\x00', 0x0}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) tkill(r1, 0x2c) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) tkill(r1, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0xb, &(0x7f00000000c0)=@raw=[@alu={0x7, 0x8, 0x0, 0xf, 0xb, 0x4, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x22}, @exit, @ldst={0x2, 0x0, 0x0, 0x7, 0xf, 0x20}, @call={0x85, 0x0, 0x0, 0x3c}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, @generic={0x8, 0x401, 0x0, 0x9}, @jmp={0x5, 0x4, 0x5, 0x0, 0xf, 0x30, 0xfffffffffffffffc}, @exit], &(0x7f0000000140)='GPL\x00', 0x200, 0xac, &(0x7f0000000240)=""/172, 0x41f00, 0x1, [], 0x0, 0xc}, 0x48) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:30:42 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) r2 = dup(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000001940)) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000240), 0x0, 0x0) [ 271.426085] SELinux: failed to load policy 20:30:42 executing program 2: getcwd(&(0x7f0000000000)=""/157, 0xfffffffffffffdc3) 20:30:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4208, r1, 0x200000000000, 0x0) tkill(r1, 0x3a) ptrace$cont(0x18, r1, 0x0, 0x0) uname(&(0x7f0000000000)=""/146) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa4}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:30:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d0700000000000000e4e73fff", 0x0, 0x8d18}, 0x28) ioctl$FICLONE(r0, 0x40049409, r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, r2, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000200)) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:30:42 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x108001, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x4, 0x6, 0x7, 0x7, 0x0, 0x6, 0x80, 0xc, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, 0x9, 0x0, 0x1, 0x0, 0x401, 0x8000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000200)='/dev/keychord\x00', 0xa000, 0x0) mkdirat$cgroup(r3, &(0x7f00000004c0)='syz1\x00', 0x1ff) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000580), 0x1f06385, 0x2, &(0x7f0000003280)={r4, r5+10000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x7f) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat6\x00') mkdir(&(0x7f0000000500)='./file0\x00', 0x56) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001800)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x201000, 0x0) chdir(&(0x7f0000000340)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x6) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000480)='./file0\x00') read(r6, 0x0, 0x0) ioctl$RNDZAPENTCNT(r6, 0x5204, &(0x7f00000001c0)=0x8) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x9c68, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xfffffffffffffffc, r0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000800)=""/4096, 0xfffffffffffffd9c}], 0x1) sync() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000040)=0x80000400) 20:30:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000000000000000a72f16"], 0x18}}], 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000000040), 0x2705e469ae184fe, 0x40010) 20:30:44 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f0000000000), r1, 0x0, 0x3, 0x8) 20:30:44 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback, 0x0, 0x2}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000000000400000000000000000000000000000000000004000400170000001f000000000700003f00000000000000030000000000120002000b00050000000100000000000000"], 0x88}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x4a) 20:30:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:44 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x2, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) preadv(r2, &(0x7f0000000480), 0x1000000000000156, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000000)) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, 0x0, 0x0) 20:30:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vL\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'bcsf0\x00', 0x403}) 20:30:44 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) read(r0, &(0x7f0000000040)=""/130, 0x82) readv(r1, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) write$evdev(r1, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(0x0) 20:30:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 273.890530] kauditd_printk_skb: 322 callbacks suppressed [ 273.890538] audit: type=1400 audit(1549139444.877:22637): avc: denied { map } for pid=9879 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x8001141042, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, 0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000140), &(0x7f0000000180)) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r2, 0x0, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffffffff, 0x14003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000200)=@buf={0x0, &(0x7f00000001c0)}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) unshare(0x40000000) 20:30:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000010c0)='/dev/input/event#\x00', 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000040)=""/108) 20:30:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) ioctl$TUNGETIFF(r1, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, 0x0, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x289, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x7) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000200)=0x17, 0x4) prctl$PR_GET_PDEATHSIG(0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x40100, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x20000600) prctl$PR_CAPBSET_READ(0x17, 0x13) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000180)) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) [ 273.949466] audit: type=1400 audit(1549139444.877:22638): avc: denied { map } for pid=9879 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/unix\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet(0x2, 0x7, 0xfffffffffffffff9) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) write$P9_RFSYNC(r0, &(0x7f00000002c0)={0x7, 0x33, 0x1}, 0x7) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2004000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x18, r2, 0xb18, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x4) r3 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r3, 0x0, 0x1, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) shutdown(r1, 0x1) [ 274.155371] audit: type=1400 audit(1549139444.917:22639): avc: denied { create } for pid=9872 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:30:45 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x6c, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80011, r0, 0x0) [ 274.294048] audit: type=1400 audit(1549139444.917:22640): avc: denied { write } for pid=9872 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:30:45 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x1, 0x6, 0x1, 0x4}, 0x5, 0x8, 'id0\x00', 'timer1\x00', 0x0, 0x100000000, 0x59d, 0x100000000, 0x54}) recvmmsg(0xffffffffffffffff, &(0x7f000000bd00)=[{{0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000002480)=""/74, 0x4a}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1c2, 0x0) 20:30:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 274.421381] audit: type=1400 audit(1549139444.997:22641): avc: denied { map } for pid=9888 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:45 executing program 3: ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f00000000c0)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r1, 0x40, &(0x7f0000000100)={0x1f, 0x20000000000000, 0x6}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000001c0)=[0x5, 0xf5]) clone(0x40800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x80) r4 = fcntl$getown(r3, 0x9) ptrace(0x4208, r4) getpgrp(r4) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r5, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r5, 0x0) [ 274.502113] audit: type=1400 audit(1549139444.997:22642): avc: denied { map } for pid=9888 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:45 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x1, 0x6, 0x1, 0x4}, 0x5, 0x8, 'id0\x00', 'timer1\x00', 0x0, 0x100000000, 0x59d, 0x100000000, 0x54}) recvmmsg(0xffffffffffffffff, &(0x7f000000bd00)=[{{0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000002480)=""/74, 0x4a}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1c2, 0x0) 20:30:45 executing program 0: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) signalfd(r0, &(0x7f0000000180)={0x9}, 0x8) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x6, 0x5}) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) socket$unix(0x1, 0x7, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r4, 0x0) write$P9_RSTATu(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xfffffffffffffffc}, {0x0, 0x0, 0x3}, {0x84f8}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x1}}, 0xe8) syz_emit_ethernet(0x83, &(0x7f0000000400)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getresgid(0x0, 0x0, 0x0) [ 274.668781] binder_alloc: binder_alloc_mmap_handler: 9928 20ffd000-20ffe000 already mapped failed -16 [ 274.702669] audit: type=1400 audit(1549139445.027:22643): avc: denied { map } for pid=9888 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 274.768439] audit: type=1400 audit(1549139445.037:22644): avc: denied { map } for pid=9888 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da298"], 0x30) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r2, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r5 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 274.795993] audit: type=1400 audit(1549139445.047:22645): avc: denied { map } for pid=9888 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) io_setup(0x0, 0x0) r2 = add_key(&(0x7f0000000480)='pkcs7_test\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)="cf751717bb5d65092040494ebb148940de4cf7ef3bc682699981d9c5c53598d27be3f970600dba64e35b4ad0daeb2ea245a747afa6e0ab339465392da8a2faf15780087eacdbde499a35d0222bb2b2ae7f1329b2a1dfa722028f075623b9fc9500ceca5e60a2bfe9198967f01e3116e0b1d00e63deac467f30e9b2d24e", 0x7d, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="e20b7d1a5353f3766f9d70fdf23042f792c9a095ca5dac9827251287ab3242294b310e4ef9f5417d563bc715b29c8b9480a7f70473f2388a43", 0x39, r3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) r6 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='*-\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, r6) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffff9c, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, 0x0, 0xffffffffffffff1f) [ 274.848642] audit: type=1400 audit(1549139445.047:22646): avc: denied { map } for pid=9889 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 274.963846] syz-executor0 (9938) used greatest stack depth: 23904 bytes left 20:30:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000140)=""/14) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x80}) clone(0x7ffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000000)={@initdev, @local, @multicast2}, 0xc) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0x1, 0x2}, {0xffffffffffff2658, 0xfffffffffffffffc}, {0x3f, 0x4}, {0x9, 0x8000}, {0x4, 0x7}, {0x1, 0x1}, {0x1, 0xdbe}, {0x1, 0x100000001}]}) fcntl$setstatus(r2, 0x4, 0x42803) [ 275.036430] binder_alloc: binder_alloc_mmap_handler: 9928 20ffc000-21000000 already mapped failed -16 20:30:46 executing program 0: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) signalfd(r0, &(0x7f0000000180)={0x9}, 0x8) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x6, 0x5}) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) socket$unix(0x1, 0x7, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r4, 0x0) write$P9_RSTATu(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xfffffffffffffffc}, {0x0, 0x0, 0x3}, {0x84f8}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x1}}, 0xe8) syz_emit_ethernet(0x83, &(0x7f0000000400)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getresgid(0x0, 0x0, 0x0) 20:30:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000000c0)=""/181) write$eventfd(r2, &(0x7f0000000080), 0x8) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000080)) 20:30:47 executing program 4: bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x13) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x8000001, 0x77fffb, 0x400, 0x820000, 0x1, 0xc5cb}, 0xfffffe9a) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x4) 20:30:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000000c0)=""/181) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 20:30:47 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80, 0x0) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000140)=0xb7) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) wait4(r1, &(0x7f00000011c0), 0x0, &(0x7f0000000080)) uname(&(0x7f00000001c0)=""/4096) 20:30:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0040, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1f) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x5) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000080)="543b2f202913ddc1", &(0x7f0000000140)}, 0x18) ptrace$cont(0x9, r2, 0x0, 0x0) [ 277.030489] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 277.061090] CPU: 0 PID: 9985 Comm: syz-executor1 Not tainted 4.14.97+ #1 [ 277.067967] Call Trace: [ 277.070562] dump_stack+0xb9/0x10e [ 277.074111] warn_alloc.cold+0x91/0x1ab [ 277.078077] ? zone_watermark_ok_safe+0x250/0x250 [ 277.082907] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 277.088006] ? avc_has_perm+0x1b7/0x350 [ 277.091998] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 277.096661] ? __vmalloc_node_range+0x390/0x690 [ 277.101317] ? trace_hardirqs_on_caller+0x37b/0x540 [ 277.106317] ? sel_write_load+0x199/0xfb0 [ 277.110449] ? vmalloc+0x60/0x80 [ 277.113799] ? sel_write_load+0x199/0xfb0 [ 277.117949] ? sel_write_load+0x199/0xfb0 [ 277.122089] ? sel_read_bool+0x240/0x240 [ 277.126136] ? mark_held_locks+0xa6/0xf0 [ 277.131178] ? retint_kernel+0x2d/0x2d [ 277.135054] ? trace_hardirqs_on_caller+0x37b/0x540 [ 277.140063] ? __vfs_write+0xf9/0x5a0 [ 277.143852] ? sel_read_bool+0x240/0x240 [ 277.147921] ? kernel_read+0x110/0x110 [ 277.151813] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 277.157249] ? rcu_read_lock_sched_held+0x10a/0x130 [ 277.162255] ? vfs_write+0x17f/0x4d0 [ 277.165958] ? SyS_write+0xc0/0x1a0 [ 277.169579] ? SyS_read+0x1a0/0x1a0 [ 277.173189] ? do_clock_gettime+0xd0/0xd0 [ 277.177322] ? do_syscall_64+0x43/0x4b0 20:30:48 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmmsg(r0, &(0x7f00000092c0), 0x215, 0x0) 20:30:48 executing program 3: io_setup(0x4, &(0x7f0000000040)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x101000, 0x0) r3 = accept$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x400b00, 0x0) io_submit(r0, 0x2, &(0x7f0000000340)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x200, r1, &(0x7f0000000080)="08245b93ffae8e59bb8b3433f883702086ced79803fe56353316d416ffb7708798b25eb08fe0879b3422ba5a3bcde094967a6570fe8885fdfdc6e18762b1c0cc49fa3c2cbae460de422b659211a46cf8d8eb9de432782facc14df78a322a3f5528d305fc9a12bce032da4cfdb587083dd380199f5e78dd3fb05539729d89459b55bad4e9465fbf057fd64be76e8fef8beb365c947a0e8fb6e07f87be75d59b63c4aaf08fef5c4651ffd18ad3bc2905f8749f3cad12ff25dea8b0865cb594f1c84515f219acd6691c23fba0b21ca0234fb8ffea1873820331cfe0ae77a681aae581e154358f03858ee9e6f473", 0xec, 0x4, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0xffffffff00000001, r3, &(0x7f0000000280)="6ed57b56133e3f30ed0cb5006ec19676590ec086559f5e9763484f3fde2ccc940abed7bf9f376386364c21799e81096a63ab7a6b7622", 0x36, 0x0, 0x0, 0x2, r4}]) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7, 0x0, 0xffffffffffffff9c}, 0x24) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 277.181279] ? SyS_read+0x1a0/0x1a0 [ 277.184895] ? do_syscall_64+0x19b/0x4b0 [ 277.188950] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:30:48 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x38) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2000, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) sendto(r0, &(0x7f00000000c0)="2327a23e4c17d4d0a2d559c73480e4d081a04d241d06c3f8df9b0c1b0d935a2526fd39c0c76a5419ff0369bba7316dad659f1965bd5fab4b3e64e3c3733bb9e7537b76049fd30a1ffd2c16befd17cd53c2545ae966054857c5eb4d075319e21a80af5276105bbea8af5c2d69f756b4cd604c3118a65e0699207d1f998ed3fedb2e5ebbb9ccc747d980228583ebf5442b5686930000574de6f26fdc1c63294a5d131c177b303c34959b97e30c7ac4c3109acc4ced9996f5d0077ad7a8b400c73285c66c4d49eb84bca2a836edb5f0f3c491bf26b63a3ec6629b441efffda7de838b523225", 0xe4, 0x8000, &(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x3, 0x101, 0xfffffffffffffff7, "a2738e6d1e798bd2a1ecbf56dd7842258f16bd3ba7392d18e7126b5d4777a0cecce3431fa80095a49f7a2589f38a40374b9b8d22e375ed4588d0d1fbad9b4a", 0x1b}, 0x80) [ 277.323025] Mem-Info: [ 277.325652] active_anon:83125 inactive_anon:40 isolated_anon:0 [ 277.325652] active_file:13970 inactive_file:16835 isolated_file:0 [ 277.325652] unevictable:0 dirty:199 writeback:0 unstable:0 [ 277.325652] slab_reclaimable:6182 slab_unreclaimable:61792 [ 277.325652] mapped:58684 shmem:47 pagetables:4615 bounce:0 [ 277.325652] free:1394061 free_pcp:417 free_cma:0 [ 277.372821] Node 0 active_anon:332312kB inactive_anon:156kB active_file:55888kB inactive_file:67340kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234712kB dirty:800kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 277.396486] DMA32 free:3011148kB min:4684kB low:7692kB high:10700kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3011884kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:736kB local_pcp:28kB free_cma:0kB [ 277.427241] lowmem_reserve[]: 0 3505 3505 [ 277.431750] Normal free:2565016kB min:5584kB low:9172kB high:12760kB active_anon:332380kB inactive_anon:164kB active_file:55884kB inactive_file:67340kB unevictable:0kB writepending:800kB present:4718592kB managed:3589208kB mlocked:0kB kernel_stack:8160kB pagetables:18120kB bounce:0kB free_pcp:996kB local_pcp:516kB free_cma:0kB [ 277.463102] lowmem_reserve[]: 0 0 0 [ 277.466921] DMA32: 5*4kB (UM) 1*8kB (M) 1*16kB (M) 3*32kB (UM) 5*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 4*2048kB (UM) 732*4096kB (M) = 3011148kB [ 277.484256] Normal: 24*4kB (ME) 14*8kB (UME) 4*16kB (UE) 558*32kB (UM) 543*64kB (UME) 198*128kB (UME) 34*256kB (UME) 18*512kB (UME) 5*1024kB (M) 3*2048kB (ME) 600*4096kB (UM) = 2565008kB [ 277.501700] 30853 total pagecache pages [ 277.505700] 0 pages in swap cache [ 277.509170] Swap cache stats: add 0, delete 0, find 0/0 [ 277.514688] Free swap = 0kB [ 277.517748] Total swap = 0kB [ 277.520896] 1965979 pages RAM [ 277.524155] 0 pages HighMem/MovableOnly [ 277.528245] 315706 pages reserved 20:30:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) 20:30:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000113, 0x0) ioctl$TIOCMSET(r0, 0x5418, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 20:30:48 executing program 3: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000140)={0x0, 0x4}) mount(&(0x7f0000000080)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x140000, &(0x7f00000001c0)='veth0_to_bridge\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0xfffffffffffffffd) ioctl$RTC_PIE_ON(r0, 0x7005) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='sockfs\x00', 0x11008, &(0x7f00000002c0)='\x00') ftruncate(r0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'veth0_to_bridge\x00', 0x3}, 0x18) fcntl$setsig(r0, 0xa, 0x2a) 20:30:48 executing program 2: r0 = socket(0x10, 0x100000003, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = dup3(r0, r0, 0x80000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x1f7) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000080)) 20:30:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:49 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x6, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/access\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000100)=0x51, 0x200020000) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) 20:30:49 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x0, 0x800000003, 0x2b}) setsockopt$inet6_udp_int(r2, 0x11, 0x6f, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x58, r0, 0xfffffffffffffffe, 0x2) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2, r0}) 20:30:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfdc30) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3dd) write$binfmt_elf64(r0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0xc23) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)={0x7, 0x3, 0x1}) 20:30:51 executing program 4: rt_sigsuspend(0x0, 0xb) r0 = memfd_create(0x0, 0x0) mlockall(0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sync_file_range(r0, 0x7, 0x0, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 20:30:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000680)=ANY=[@ANYBLOB="070400000000060000004cd6665f04d5b302dff009000000000000000000000000000000ace7aafcce66867a66648855166a81454f6449a295432dceff984cfde1c0b774a21d789e8eefd7db723227bfb2dc8463ce676b32fd39f5a2fb204183d9cb6403a2f146ecc4e416effef0", @ANYRES32=r0, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000faffffffffffffff00000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000030000000000000000000000000000000000000000000000"]) socketpair(0xa, 0x3, 0xfffffffffffffff8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x304, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x4, 0x4, 0x3d0}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x84}, 0x4000810) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000080)=0x13, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x141380, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\xb4(-$\xde`\x97\x8c\xe6\xcd\x8d\x99\x03\xe5u\x97\x14\xb0\xd6\xd0\xae\xcf\xd9\x1e\x1f\xd00=#\xa3\xd4v\xd8\xbdj\x10(\xb6\xf7\x15\xe1\x88\xe7]\xca\xdc\x02\xdc\v\xbd@T\xea\xb7XmW\xffk\xc4\x96M|\xf1\x1f\xfa$\xf8IW\xc4J\xc6\xf0_\xc3\x86\x0f\xbd\x83V\x9ar\x02\xbf\xa0+\xe2.i\x7fP\xebnW\x90\x8d\xc5\xc7w\t\xeb\xd9\xec\xd8\x87WA\xee\x15O]\xafI\x03\x9b\x9f\"\x1c\vMdKm\x7f$\"cIB#\xe1Zt\xc7\xc7\x9f\xa0\xd3\x18\x1d\t\xee\x86\xe8\xda\xae\xeeo\xf8s6WK5:\a\xa5\x89\x9a8\xb4\'\xf7\a\xe6\xbe\"<\xd2IS\x04\xb4\xb4\xee\x80\a\x9d\x1b\x15\xfa\xadAB\xdf\x17l\'7\xf9[\xe17\xcb\xdcF\x87\xddW[#\xa5\x1cK&\x13\x1cF\x0e\xd5O\xf3\xd9\xc1\x0eYwk}\xbc \xe8\xd0l\xe1\xe2\x9a\x84') 20:30:51 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x6, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/access\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000100)=0x51, 0x200020000) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) 20:30:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000180)='+\x06ppp0%.vboxnet0*{self\x00'}, 0x30) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x2800000000000, 0x6, 0x2, 0x1, 0x0, 0x3, 0x202, 0x8, 0x2, 0x0, 0x4, 0xff, 0x6, 0x8, 0x7fffffff, 0x3ff, 0x80000000, 0x3, 0x26a6, 0x0, 0x34, 0x4, 0x6, 0x0, 0x27, 0x401, 0x3, 0x7, 0xf78, 0x9, 0xc5, 0x10000, 0x839c, 0x20, 0x7fffffff, 0x2, 0x0, 0x7fff, 0x0, @perf_config_ext={0x6, 0x157}, 0x8004, 0x7, 0x100000000, 0x1, 0x0, 0x9, 0x50000000000}, r1, 0x8, r2, 0x2) syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:30:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0xa72c, 0x0, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000b28000)=0xffffffffffff005e) [ 280.111668] kauditd_printk_skb: 109 callbacks suppressed [ 280.111676] audit: type=1400 audit(1549139451.087:22756): avc: denied { create } for pid=10053 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 280.114999] syz-executor1: 20:30:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) r1 = inotify_init1(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x2, 0x0) write$P9_RSTATFS(r2, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x1, 0x9, 0x7, 0x4, 0xde2e, 0x4, 0x7f, 0x3f, 0x4}}, 0x43) inotify_add_watch(r1, &(0x7f00000002c0)='./file0\x00', 0xa500295c) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) [ 280.118280] audit: type=1400 audit(1549139451.097:22757): avc: denied { write } for pid=10053 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:30:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[], 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:51 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xffffffffffbffff8) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='\x00', r3}, 0x10) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x16) [ 280.270434] vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 280.293715] audit: type=1400 audit(1549139451.127:22758): avc: denied { map } for pid=10063 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.314442] CPU: 0 PID: 10059 Comm: syz-executor1 Not tainted 4.14.97+ #1 [ 280.322807] Call Trace: [ 280.325401] dump_stack+0xb9/0x10e [ 280.328969] warn_alloc.cold+0x91/0x1ab [ 280.332947] ? zone_watermark_ok_safe+0x250/0x250 [ 280.337790] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 280.342915] ? avc_has_perm+0x1b7/0x350 [ 280.346894] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 280.352910] audit: type=1400 audit(1549139451.177:22759): avc: denied { read } for pid=10053 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 280.353096] ? __vmalloc_node_range+0x390/0x690 [ 280.353114] ? sel_write_load+0x199/0xfb0 [ 280.379340] audit: type=1400 audit(1549139451.197:22760): avc: denied { map } for pid=10065 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.381803] ? vmalloc+0x60/0x80 [ 280.381815] ? sel_write_load+0x199/0xfb0 [ 280.381824] ? sel_write_load+0x199/0xfb0 20:30:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10400004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="74030000", @ANYRES16=r3, @ANYBLOB="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"], 0x374}, 0x1, 0x0, 0x0, 0x40}, 0x8c0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) ioctl$void(r0, 0x5450) [ 280.381841] ? check_preemption_disabled+0x35/0x1f0 [ 280.381853] ? sel_read_bool+0x240/0x240 [ 280.386048] audit: type=1400 audit(1549139451.197:22761): avc: denied { create } for pid=10053 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 280.408090] ? trace_hardirqs_on+0x10/0x10 [ 280.408100] ? check_preemption_disabled+0x35/0x1f0 [ 280.408124] ? __vfs_write+0xf9/0x5a0 [ 280.408130] ? sel_read_bool+0x240/0x240 [ 280.408139] ? HARDIRQ_verbose+0x10/0x10 [ 280.408148] ? kernel_read+0x110/0x110 [ 280.408184] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 280.418803] audit: type=1400 audit(1549139451.197:22762): avc: denied { write } for pid=10053 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 280.419828] ? rcu_read_lock_sched_held+0x10a/0x130 [ 280.419848] ? vfs_write+0x17f/0x4d0 [ 280.431745] audit: type=1400 audit(1549139451.207:22763): avc: denied { map } for pid=10065 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.454514] ? SyS_write+0xc0/0x1a0 [ 280.454525] ? SyS_read+0x1a0/0x1a0 [ 280.454535] ? do_clock_gettime+0xd0/0xd0 [ 280.454547] ? do_syscall_64+0x43/0x4b0 [ 280.454555] ? SyS_read+0x1a0/0x1a0 [ 280.454569] ? do_syscall_64+0x19b/0x4b0 20:30:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x3, 0x209e1e, 0x407fffffffff, 0x2}, 0x2c) r1 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, &(0x7f0000000180)=0x80, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb4, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5ea9fc70}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffffffffffffff}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2b72195b}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa3}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getresuid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000380)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={r3, r4, r5}, 0xc) 20:30:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[], 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 280.458881] audit: type=1400 audit(1549139451.207:22764): avc: denied { map } for pid=10065 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.463922] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.505517] Mem-Info: [ 280.680808] audit: type=1400 audit(1549139451.217:22765): avc: denied { map } for pid=10072 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.772629] active_anon:83139 inactive_anon:40 isolated_anon:0 [ 280.772629] active_file:13690 inactive_file:16795 isolated_file:0 [ 280.772629] unevictable:7550 dirty:210 writeback:0 unstable:0 [ 280.772629] slab_reclaimable:6181 slab_unreclaimable:61800 [ 280.772629] mapped:61534 shmem:47 pagetables:4633 bounce:0 [ 280.772629] free:1386571 free_pcp:451 free_cma:0 [ 280.874842] Node 0 active_anon:332348kB inactive_anon:152kB active_file:54756kB inactive_file:67496kB unevictable:37140kB isolated(anon):0kB isolated(file):0kB mapped:253012kB dirty:856kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:30:51 executing program 4: memfd_create(&(0x7f0000000000)='cpuset,selinux-\'em0bdevselinux}}\x00', 0x0) r0 = socket$inet(0x10, 0x2, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="24000000010407031dfffd9466e6000000fcf70009000100031d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 280.902413] DMA32 free:3011148kB min:4684kB low:7692kB high:10700kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3011884kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:736kB local_pcp:28kB free_cma:0kB [ 280.938028] lowmem_reserve[]: 0 3505 3505 [ 280.942723] Normal free:2546124kB min:5584kB low:9172kB high:12760kB active_anon:332348kB inactive_anon:552kB active_file:74156kB inactive_file:67096kB unevictable:0kB writepending:856kB present:4718592kB managed:3589208kB mlocked:12kB kernel_stack:8128kB pagetables:18248kB bounce:0kB free_pcp:1372kB local_pcp:728kB free_cma:0kB 20:30:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) inotify_add_watch(r1, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$int_out(r0, 0x5462, 0x0) 20:30:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x104, r2, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb380}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffd0b6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3a7c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffbff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6ed8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) write$eventfd(r1, &(0x7f00000002c0)=0x9, 0x8) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000004c0)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x3, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f00000092c0), 0x170, 0x0) r4 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0xfff, 0x2, 0x7, 0xb0, 0x0, 0x7, 0x40008, 0xf, 0x2, 0x1ff, 0x23, 0x37, 0x6a, 0x4, 0x0, 0x1, 0x5, 0x41, 0x3, 0x8, 0x9d66, 0x8, 0xd9, 0x4, 0x1f, 0x1, 0x2, 0x4, 0x2, 0x1, 0x8, 0xa7bd, 0x9, 0x6, 0x7fff, 0x2, 0x0, 0x10001, 0x6, @perf_config_ext={0x100000001, 0x4}, 0x20, 0x3, 0x1, 0x7, 0x101, 0x7, 0xfffffffffffffbff}, r4, 0x6, r1, 0x1) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_genetlink_get_family_id$tipc(&(0x7f00000008c0)='TIPC\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in=@initdev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) r7 = getegid() r8 = getegid() fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f0000000900)={@remote, @empty, @loopback}, 0xc) r11 = getegid() getgroups(0x6, &(0x7f0000000740)=[0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) getresgid(&(0x7f0000000780)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) r14 = getegid() setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000840)={{}, {0x1, 0x1}, [{0x2, 0x2, r5}, {0x2, 0x1, r6}], {0x4, 0x5}, [{0x8, 0x1, r7}, {0x8, 0x2, r8}, {0x8, 0x3, r9}, {0x8, 0x7, r10}, {0x8, 0x2, r11}, {0x8, 0x6, r12}, {0x8, 0x1, r13}, {0x8, 0x0, r14}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x1) 20:30:51 executing program 5: r0 = socket$inet(0x10, 0xf, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000140)='/dev/zero\x00', &(0x7f0000000180)='.#procvboxnet0mime_typewlan0/\x00', &(0x7f00000001c0)='vboxnet1em0vboxnet1]%nodev\x00', &(0x7f0000000540)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000280)='/dev/zero\x00', &(0x7f00000002c0)='/dev/zero\x00', &(0x7f0000000340)='vmnet0bdevusercgroupwlan0selinux^system\xe7\x00', &(0x7f0000000380)='.trustedsystem\x00', &(0x7f00000003c0)='\x00'], &(0x7f00000004c0)=[&(0x7f0000000480)='/dev/zero\x00']) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="24000000240007031dfffd946f610500070000000500000000000000f1ffffff0400ff7e", 0x24}], 0x1}, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x40050, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 20:30:51 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x6, r0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xbb, 0x101080) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000200)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2800, 0x0) timerfd_settime(r3, 0x1, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) bind$inet(r3, 0x0, 0x2db) ioctl$void(r1, 0x5450) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:30:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[], 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 280.978022] lowmem_reserve[]: 0 0 0 [ 280.982100] DMA32: 5*4kB (UM) 1*8kB (M) 1*16kB (M) 3*32kB (UM) 5*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 4*2048kB (UM) 732*4096kB (M) = 3011148kB [ 281.022121] Normal: 98*4kB (UME) 42*8kB (ME) 16*16kB (ME) 454*32kB (UM) 537*64kB (UME) 205*128kB (UME) 33*256kB (UME) 5*512kB (UME) 1*1024kB (M) 2*2048kB (ME) 599*4096kB (UM) = 2545752kB 20:30:52 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x200000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in=@multicast1}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) getresuid(0x0, &(0x7f00000005c0), &(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000b00)='team\x00') fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000b80)={0x0, 0x1, 0x6, @local}, 0x10) getresuid(&(0x7f0000000780), &(0x7f00000007c0)=0x0, 0x0) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x64, r6, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r4}, {0x8, 0x1, r4}, {0x8, 0x1, r4}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x24000040}, 0x80) fstat(r2, &(0x7f00000008c0)) r7 = fcntl$getown(r2, 0x9) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000400)={r7, r5, r3}, 0xc) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) openat(r8, &(0x7f00000003c0)='./file0\x00', 0x600000, 0x4) write$cgroup_subtree(r8, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r9, 0x6609) execve(0x0, 0x0, 0x0) 20:30:52 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:qemu_device_t:s0\x00', 0x23) r1 = syz_open_dev$evdev(&(0x7f00000010c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000040)=""/108) [ 281.100106] 35342 total pagecache pages [ 281.104129] 0 pages in swap cache [ 281.107592] Swap cache stats: add 0, delete 0, find 0/0 20:30:52 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='vxcan1\x00') getpeername$packet(r0, &(0x7f0000003800)={0x11, 0x0, 0x0}, &(0x7f0000003840)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003880)={'bridge0\x00', r1}) sync() r2 = add_key(&(0x7f00000038c0)='rxrpc_s\x00', &(0x7f0000003900)={'syz', 0x3}, &(0x7f0000003940)="bbbdca7faf49597ae885233f", 0xc, 0xfffffffffffffff8) r3 = add_key$user(&(0x7f0000003dc0)='user\x00', &(0x7f0000003e00)={'syz', 0x0}, &(0x7f0000003e40)="e5b185adc9379edb4cb8014ce0f320d130bbf9f24c2ee4f639b10a57c14d02ca5f5776513bc39094b068843efcce8900a5ccfc9ee5748c37defc74091c7a06df0b760f641cfa3ec58ac6e8aa2f3f5d813befd78d9df92c266d53a63072ce62de7a7b42d33d98b440a8792a490301553b8ebcb6ff3b77c6af12572ad6fc56ddbf61bc94a564a0a7275b360b74169e3917f7db7b782ec4b52a4c0999d057", 0x9d, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r2, &(0x7f0000003d40)=[{&(0x7f0000003980)="6412589b4005979bc8b1c83a891a06abbf971e6d58a1cf070e0a79382f392709c18da8ebe46b1e3213150219c4aa00948695d7de59e8b813d47e8d2593906d14c609515e61c9f134ffe00bdc74c26667ef6845dd47fe746aba0e5729e373a634e2e79db5b28f0a98eb1aef7e35928358c070ab70b2884abe5baf62b7459bb3c1d4f6c3057cc13d160a7c6e9ab519087300ca105586cccef19e359ff5b397c58e8810178edeccdedf871490d70b99ce38237d9539769354677f19d5cd", 0xbc}, {&(0x7f0000003a40)="948b14c16b7fb5ba1db32403d4648427bd988d5bd86c61aa8a945f59b2f06aa2ed79271724fb4d93442ae721408a5a0d92724ea1883783aa4ab6187f11f36b18f156dabc9403952c8496d2c3be68b58b121ad53f36aec293c1efb12ef09172def0b7e493381f33e9bf58fb5f9741afd3c1f89f3b30864fa1efa03455e53abd4840975ed80bcbbede85cbbd4de69b4997de2cafeeb3d6587c5af83e5cc7569f263401e9c6b0332f", 0xa7}, {&(0x7f0000003b00)="0a60f0e486a0dcf28a6ad866b9ef741420872939dafa9c93654c56bc5e32be5226cc06f31c0b42eaa2d357aeffe83080731c8834f9054c85315bb4def37a3a321cdfef7f2ece3c469994bbf819a3703e73c56f35f098a4", 0x57}, {&(0x7f0000003b80)="a99796a5decd61126fa88ea12dc0c7fb83571dacb312ca2138398bc2a67d8eb255b75183b29280984dbefc4b3f4b03944f29339bdc39e73dab3c015c73aaaf6d88dbf3660ff368990795e9f71613808453938b8f6451b2ae3ed40fd195ef3be06543a83668c06608bd6c3cb8bc2d0f011462cd0d28f8b1933a79db3ce8ca28951b4f802eadab5effd4948316c2291c81179cb308", 0x94}, {&(0x7f0000003c40)="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", 0xfa}], 0x5, r3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xc9b4) r4 = fcntl$getown(r0, 0x9) r5 = syz_open_procfs(r4, &(0x7f0000003f00)='net/netfilter\x00') ioctl$BLKIOOPT(r5, 0x1279, &(0x7f0000003f40)) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000003f80)=""/4096, &(0x7f0000004f80)=0x1000) getresuid(&(0x7f0000005040)=0x0, &(0x7f0000005080), &(0x7f00000050c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005100)={0x0, 0x0}, &(0x7f0000005140)=0xc) fstat(r0, &(0x7f0000005180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000052c0)={0x0, 0x0, 0x0}, &(0x7f0000005300)=0xc) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000005340)={0x0, 0x0, 0x0}, &(0x7f0000005380)=0xc) getgroups(0x5, &(0x7f00000053c0)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005400)={0x0, 0x0, 0x0}, &(0x7f0000005440)=0xc) getgroups(0x8, &(0x7f0000005480)=[0xee00, 0xee01, 0x0, 0x0, 0xee01, 0xee01, 0xee01, 0xee00]) lsetxattr$system_posix_acl(&(0x7f0000004fc0)='./file0\x00', &(0x7f0000005000)='system.posix_acl_access\x00', &(0x7f00000054c0)={{}, {0x1, 0x1}, [{0x2, 0x4, r6}, {0x2, 0x2, r7}], {0x4, 0x1}, [{0x8, 0x1, r8}, {0x8, 0x2, r9}, {0x8, 0x1, r10}, {0x8, 0x6, r11}, {0x8, 0x1, r12}, {0x8, 0x2, r14}, {0x8, 0x2, r15}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) setsockopt$inet6_buf(r0, 0x29, 0x27, &(0x7f0000005540), 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000005580)="ea318884a74e435bbaee5dd9264093ba", 0x10) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f00000055c0)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) fchown(r0, r6, r13) connect$netlink(r0, &(0x7f0000005600)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40082400}, 0xc) r16 = syz_genetlink_get_family_id$tipc(&(0x7f0000005680)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000005740)={&(0x7f0000005640)={0x10, 0x0, 0x0, 0x1a058000}, 0xc, &(0x7f0000005700)={&(0x7f00000056c0)={0x30, r16, 0x2a, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0xffffffffffffff00, @bearer=@udp='udp:syz1\x00'}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) [ 281.150734] Free swap = 0kB [ 281.153797] Total swap = 0kB [ 281.156812] 1965979 pages RAM [ 281.159912] 0 pages HighMem/MovableOnly [ 281.221089] 315706 pages reserved [ 281.224854] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 281.283457] CPU: 1 PID: 10086 Comm: syz-executor1 Not tainted 4.14.97+ #1 [ 281.290895] Call Trace: [ 281.293478] dump_stack+0xb9/0x10e [ 281.297032] warn_alloc.cold+0x91/0x1ab [ 281.301016] ? zone_watermark_ok_safe+0x250/0x250 [ 281.305862] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 281.310984] ? avc_has_perm+0x1b7/0x350 [ 281.314964] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 281.319646] ? __vmalloc_node_range+0x390/0x690 [ 281.324326] ? sel_write_load+0x199/0xfb0 [ 281.328480] ? vmalloc+0x60/0x80 [ 281.331850] ? sel_write_load+0x199/0xfb0 [ 281.336000] ? sel_write_load+0x199/0xfb0 [ 281.340156] ? check_preemption_disabled+0x35/0x1f0 [ 281.345177] ? sel_read_bool+0x240/0x240 [ 281.349253] ? trace_hardirqs_on+0x10/0x10 [ 281.353494] ? check_preemption_disabled+0x35/0x1f0 [ 281.358525] ? __vfs_write+0xf9/0x5a0 [ 281.362334] ? sel_read_bool+0x240/0x240 [ 281.366394] ? HARDIRQ_verbose+0x10/0x10 [ 281.370464] ? kernel_read+0x110/0x110 [ 281.374382] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 281.379837] ? rcu_read_lock_sched_held+0x10a/0x130 [ 281.384863] ? vfs_write+0x17f/0x4d0 [ 281.388596] ? SyS_write+0xc0/0x1a0 [ 281.392507] ? SyS_read+0x1a0/0x1a0 [ 281.396129] ? do_clock_gettime+0xd0/0xd0 [ 281.400278] ? do_syscall_64+0x43/0x4b0 [ 281.404253] ? SyS_read+0x1a0/0x1a0 [ 281.407887] ? do_syscall_64+0x19b/0x4b0 [ 281.411962] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:30:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x8, 0x80010005}, 0x2c) getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) r1 = getgid() r2 = getegid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xee00, 0x0, 0xee01]) getgroups(0x6, &(0x7f00000003c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0, 0xee01, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) r11 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$GIO_SCRNMAP(r11, 0x4b40, &(0x7f0000000540)=""/4096) lchown(&(0x7f00000004c0)='./file0\x00', r3, r8) getgroups(0xa, &(0x7f0000000480)=[r0, r1, r2, r4, r5, r6, r7, r8, r9, r10]) [ 281.443996] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 281.456871] CPU: 1 PID: 10124 Comm: syz-executor1 Not tainted 4.14.97+ #1 [ 281.463818] Call Trace: [ 281.466419] dump_stack+0xb9/0x10e [ 281.469976] warn_alloc.cold+0x91/0x1ab [ 281.473954] ? zone_watermark_ok_safe+0x250/0x250 [ 281.478802] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 281.483937] ? avc_has_perm+0x1b7/0x350 [ 281.487923] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 281.492894] ? __vmalloc_node_range+0x390/0x690 [ 281.497579] ? sel_write_load+0x199/0xfb0 [ 281.501739] ? vmalloc+0x60/0x80 [ 281.505114] ? sel_write_load+0x199/0xfb0 [ 281.509269] ? sel_write_load+0x199/0xfb0 [ 281.513437] ? check_preemption_disabled+0x35/0x1f0 [ 281.518466] ? sel_read_bool+0x240/0x240 [ 281.522552] ? trace_hardirqs_on+0x10/0x10 [ 281.526794] ? check_preemption_disabled+0x35/0x1f0 [ 281.531833] ? __vfs_write+0xf9/0x5a0 [ 281.535637] ? sel_read_bool+0x240/0x240 [ 281.539702] ? HARDIRQ_verbose+0x10/0x10 [ 281.543772] ? kernel_read+0x110/0x110 [ 281.547695] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 281.553156] ? rcu_read_lock_sched_held+0x10a/0x130 [ 281.558193] ? vfs_write+0x17f/0x4d0 [ 281.561920] ? SyS_write+0xc0/0x1a0 [ 281.565558] ? SyS_read+0x1a0/0x1a0 [ 281.569190] ? do_clock_gettime+0xd0/0xd0 [ 281.573346] ? __fget_light+0x16a/0x1f0 [ 281.577323] ? do_syscall_64+0x43/0x4b0 [ 281.581302] ? SyS_read+0x1a0/0x1a0 [ 281.584940] ? do_syscall_64+0x19b/0x4b0 [ 281.589018] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:30:52 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x4, 0x7, 0x9, 0x6}) socket$netlink(0x10, 0x3, 0x8000000004) [ 281.629200] warn_alloc_show_mem: 1 callbacks suppressed [ 281.629204] Mem-Info: [ 281.640769] active_anon:83257 inactive_anon:40 isolated_anon:0 [ 281.640769] active_file:18559 inactive_file:16740 isolated_file:0 [ 281.640769] unevictable:0 dirty:21 writeback:0 unstable:0 [ 281.640769] slab_reclaimable:6234 slab_unreclaimable:62020 [ 281.640769] mapped:58709 shmem:47 pagetables:4693 bounce:0 [ 281.640769] free:1388848 free_pcp:372 free_cma:0 [ 281.696149] Node 0 active_anon:333028kB inactive_anon:160kB active_file:74236kB inactive_file:66960kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234836kB dirty:84kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:30:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x104, r2, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb380}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffd0b6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3a7c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffbff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6ed8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) write$eventfd(r1, &(0x7f00000002c0)=0x9, 0x8) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000004c0)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x3, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f00000092c0), 0x170, 0x0) r4 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0xfff, 0x2, 0x7, 0xb0, 0x0, 0x7, 0x40008, 0xf, 0x2, 0x1ff, 0x23, 0x37, 0x6a, 0x4, 0x0, 0x1, 0x5, 0x41, 0x3, 0x8, 0x9d66, 0x8, 0xd9, 0x4, 0x1f, 0x1, 0x2, 0x4, 0x2, 0x1, 0x8, 0xa7bd, 0x9, 0x6, 0x7fff, 0x2, 0x0, 0x10001, 0x6, @perf_config_ext={0x100000001, 0x4}, 0x20, 0x3, 0x1, 0x7, 0x101, 0x7, 0xfffffffffffffbff}, r4, 0x6, r1, 0x1) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_genetlink_get_family_id$tipc(&(0x7f00000008c0)='TIPC\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in=@initdev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) r7 = getegid() r8 = getegid() fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f0000000900)={@remote, @empty, @loopback}, 0xc) r11 = getegid() getgroups(0x6, &(0x7f0000000740)=[0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) getresgid(&(0x7f0000000780)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) r14 = getegid() setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000840)={{}, {0x1, 0x1}, [{0x2, 0x2, r5}, {0x2, 0x1, r6}], {0x4, 0x5}, [{0x8, 0x1, r7}, {0x8, 0x2, r8}, {0x8, 0x3, r9}, {0x8, 0x7, r10}, {0x8, 0x2, r11}, {0x8, 0x6, r12}, {0x8, 0x1, r13}, {0x8, 0x0, r14}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x1) 20:30:52 executing program 4: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r0 = memfd_create(&(0x7f0000000200)='ppp1\xd0&}!cgroupselfmd5sum\x00', 0x5) write$eventfd(r0, &(0x7f0000000080)=0x5, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000001c0)={0x7f, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x4, 'fo\x00', 0x1, 0x100, 0x7}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000140)={'exec ', '#em1#+\x00'}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x444, &(0x7f0000000000)=[{}]}, 0x10) [ 281.728508] DMA32 free:3011148kB min:4684kB low:7692kB high:10700kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3011884kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:736kB local_pcp:708kB free_cma:0kB 20:30:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x400f) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000f60000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b55be7b540008000a0000000000"], 0x334}}, 0x0) r1 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, r1, &(0x7f0000000100)=""/92, 0x5c) 20:30:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000180)) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x2) sendfile(r0, r2, 0x0, 0x20000102000007) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20044000) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000540)={@rand_addr="e777da54a4f9d281a1b5c39b60647262", r6}, 0x14) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000580)=""/189) [ 281.870138] lowmem_reserve[]: 0 3505 3505 [ 281.874390] Normal free:2544536kB min:5584kB low:9172kB high:12760kB active_anon:333028kB inactive_anon:160kB active_file:74236kB inactive_file:66960kB unevictable:0kB writepending:144kB present:4718592kB managed:3589208kB mlocked:0kB kernel_stack:8512kB pagetables:18772kB bounce:0kB free_pcp:788kB local_pcp:592kB free_cma:0kB 20:30:52 executing program 4: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x100802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) lseek(r0, 0x0, 0x1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffe75) 20:30:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000000}, r1, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) pread64(r2, &(0x7f0000000340)=""/239, 0xef, 0x0) poll(&(0x7f0000000200)=[{}, {}, {0xffffffffffffffff, 0x8}, {}], 0x4, 0x0) fallocate(r2, 0x28, 0x0, 0xffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') getxattr(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=@known='system.advise\x00', &(0x7f0000000500)=""/135, 0x87) [ 282.050125] lowmem_reserve[]: 0 0 0 [ 282.053825] DMA32: 5*4kB (UM) 1*8kB (M) 1*16kB (M) 3*32kB (UM) 5*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 4*2048kB (UM) 732*4096kB (M) = 3011148kB [ 282.137680] Normal: 3*4kB (ME) 5*8kB (UME) 15*16kB (UME) 428*32kB (UM) 538*64kB (UM) 202*128kB (UME) 32*256kB (UME) 7*512kB (UME) 1*1024kB (M) 2*2048kB (ME) 599*4096kB (UM) = 2544676kB 20:30:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000600)=""/4096, &(0x7f0000000000)=0x1000) sendto$inet6(r2, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = fcntl$getown(r0, 0x9) ptrace$pokeuser(0x6, r3, 0x3, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x18, &(0x7f0000c86000), &(0x7f00000005c0)=0xffffff79) [ 282.202932] 35356 total pagecache pages [ 282.207397] 0 pages in swap cache [ 282.212113] Swap cache stats: add 0, delete 0, find 0/0 [ 282.217594] Free swap = 0kB [ 282.221371] Total swap = 0kB [ 282.226829] 1965979 pages RAM [ 282.231421] 0 pages HighMem/MovableOnly [ 282.237275] 315706 pages reserved 20:30:53 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x1ffc00, 0x0, 0x0, 0x1, 0x120, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) r4 = accept$inet(r3, &(0x7f0000000580)={0x2, 0x0, @loopback}, &(0x7f00000005c0)=0xfffffffffffffc78) r5 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000600)='self:\xdd0xffffffffffffffff, 0xffffffffffffffff}) write(r11, &(0x7f00000001c0), 0x100000073) read(r10, &(0x7f0000000200)=""/250, 0x50c7e3e3) fstat(r1, &(0x7f00000008c0)) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x45, 0xe68, 0x0, 0x2, 0x0, 0x0, 0x30428, 0x9, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, 0x0, 0x0, 0x0, 0xb1, 0x1, 0x7fea7b87, 0x4, 0xffffffffffffff00, 0x10000000000008, 0x0, 0x93, 0x9, 0x4, 0x3, 0x0, 0xffff, 0x2, 0x4, 0x80000001, 0x0, 0x40, 0x0, 0x73380336, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x2, 0x0, 0x8, 0x4, 0x0, 0x1}, 0x0, 0x6, r4, 0x0) 20:30:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x1, @loopback, 0x5}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x0, 0x0, 0xc7, 0x8, 0x2, 0x8]}, 0x5c) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x25) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x200000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in=@multicast1}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) geteuid() geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, 0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) fstat(r2, &(0x7f00000008c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 20:30:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$RTC_PIE_OFF(r0, 0x7006) socket$nl_xfrm(0x10, 0x3, 0x6) chroot(0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') write$P9_RVERSION(0xffffffffffffffff, 0x0, 0xf5) 20:30:53 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x6, 0xffffffff}) preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000040)=""/16, 0x10}], 0x1, 0x0) [ 282.578201] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 282.625392] CPU: 1 PID: 10212 Comm: syz-executor1 Not tainted 4.14.97+ #1 [ 282.632466] Call Trace: [ 282.635064] dump_stack+0xb9/0x10e [ 282.638623] warn_alloc.cold+0x91/0x1ab [ 282.642605] ? zone_watermark_ok_safe+0x250/0x250 [ 282.647462] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 282.652588] ? avc_has_perm+0x1b7/0x350 [ 282.656572] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 282.661260] ? __vmalloc_node_range+0x390/0x690 [ 282.665944] ? sel_write_load+0x199/0xfb0 [ 282.670104] ? vmalloc+0x60/0x80 [ 282.673483] ? sel_write_load+0x199/0xfb0 [ 282.677635] ? sel_write_load+0x199/0xfb0 [ 282.681800] ? check_preemption_disabled+0x35/0x1f0 [ 282.686829] ? sel_read_bool+0x240/0x240 [ 282.690902] ? trace_hardirqs_on+0x10/0x10 [ 282.695143] ? check_preemption_disabled+0x35/0x1f0 [ 282.700180] ? __vfs_write+0xf9/0x5a0 [ 282.704026] ? sel_read_bool+0x240/0x240 [ 282.708461] ? HARDIRQ_verbose+0x10/0x10 [ 282.712524] ? kernel_read+0x110/0x110 [ 282.716445] ? rcu_lockdep_current_cpu_online+0xed/0x140 20:30:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) sched_getscheduler(r2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0xfff5, &(0x7f00000000c0)={@link_local, @remote, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @dev, @local, @local, @mcast2}}}}, 0x0) [ 282.721913] ? rcu_read_lock_sched_held+0x10a/0x130 [ 282.726940] ? vfs_write+0x17f/0x4d0 [ 282.730669] ? SyS_write+0xc0/0x1a0 [ 282.734302] ? SyS_read+0x1a0/0x1a0 [ 282.737935] ? do_clock_gettime+0xd0/0xd0 [ 282.742091] ? __fget_light+0x16a/0x1f0 [ 282.746070] ? do_syscall_64+0x43/0x4b0 [ 282.750047] ? SyS_read+0x1a0/0x1a0 [ 282.753681] ? do_syscall_64+0x19b/0x4b0 [ 282.757763] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:30:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000001140)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000540)=""/154, 0x9a}], 0x1) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000600)='syz0\x00') write$uinput_user_dev(r1, &(0x7f00000000c0)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 20:30:53 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x4000, 0x0) ioctl$TIOCCONS(r0, 0x541d) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = inotify_init() set_tid_address(&(0x7f0000000300)) inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='./file0\x00') link(&(0x7f0000001ec0)='./file0\x00', &(0x7f0000000280)='./file0\x00') ioctl$int_out(r1, 0x5462, &(0x7f0000000200)) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[], 0x2e7) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$revoke(0x3, 0x0) mkdirat(r3, &(0x7f0000000180)='./file0\x00', 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x101ff}, 0x28, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000004c0)={0x4}, 0x4) 20:30:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000180)=""/216) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x20000802, &(0x7f0000000140)={0x2, 0x10004e23}, 0x68) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getrusage(0x1, &(0x7f0000000280)) timer_settime(0x0, 0x0, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 20:30:54 executing program 2: socket$nl_route(0x10, 0x3, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:30:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = socket(0x10, 0x802, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f0046bbc04fef7001c020b49ff00000000800008000800030001000000", 0x24) [ 283.193764] Mem-Info: [ 283.196348] active_anon:89016 inactive_anon:39 isolated_anon:0 [ 283.196348] active_file:18564 inactive_file:16747 isolated_file:0 [ 283.196348] unevictable:0 dirty:164 writeback:0 unstable:0 [ 283.196348] slab_reclaimable:6264 slab_unreclaimable:61844 [ 283.196348] mapped:58684 shmem:47 pagetables:4763 bounce:0 [ 283.196348] free:1382887 free_pcp:442 free_cma:0 [ 283.243481] Node 0 active_anon:350964kB inactive_anon:156kB active_file:74256kB inactive_file:66988kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234736kB dirty:656kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 283.315311] DMA32 free:3011148kB min:4684kB low:7692kB high:10700kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3011884kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:736kB local_pcp:708kB free_cma:0kB [ 283.378839] lowmem_reserve[]: 0 3505 3505 [ 283.384863] Normal free:2531292kB min:5584kB low:9172kB high:12760kB active_anon:346364kB inactive_anon:156kB active_file:74256kB inactive_file:66988kB unevictable:0kB writepending:656kB present:4718592kB managed:3589208kB mlocked:0kB kernel_stack:8352kB pagetables:18756kB bounce:0kB free_pcp:1080kB local_pcp:684kB free_cma:0kB [ 283.416835] lowmem_reserve[]: 0 0 0 [ 283.420605] DMA32: 5*4kB (UM) 1*8kB (M) 1*16kB (M) 3*32kB (UM) 5*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 4*2048kB (UM) 732*4096kB (M) = 3011148kB [ 283.436511] Normal: 210*4kB (UM) 96*8kB (UM) 57*16kB (UME) 407*32kB (UM) 470*64kB (UM) 170*128kB (UME) 25*256kB (UME) 7*512kB (UME) 1*1024kB (M) 2*2048kB (ME) 598*4096kB (UM) = 2531896kB [ 283.453531] 35358 total pagecache pages [ 283.457511] 0 pages in swap cache [ 283.461237] Swap cache stats: add 0, delete 0, find 0/0 [ 283.466638] Free swap = 0kB [ 283.469669] Total swap = 0kB [ 283.472894] 1965979 pages RAM 20:30:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) 20:30:54 executing program 4: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000000100000001000000004000000040000000000000002000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) r0 = accept$inet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000340)={'lo\x00', 0x80}) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v2={0x5, 0x0, 0x0, 0x7fff, 0x67, "6430cd7d569429c11ab870aa3df9ac9c3dcdc1231ab01acdc01690955d702664d847f493fdb7bddd4921f01ec5a81d9696132c1309cf1193797b3b6a4f4f774751dd36e340a324d5c8c6872813535ce35393318d52caf4ae4f2b288217ad924a21de218fa3bc0a"}, 0x71, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000480)={0x1000, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0xb, 0x1ff, 0x1, 0xa2, 0x5, 0x3, 0x3, 0x1, 0x18b, 0x38, 0xfffffffffffffffc, 0x6, 0x800, 0x20, 0x2, 0xfffffffffffffffb, 0x20000000000000, 0x1}, [{0x60000007, 0x1, 0x80000001, 0x9, 0x4, 0xfffffffffffffffa, 0x9, 0xa6}], "90084f1b3ec6e17db693e2a488c6c70f8656b0aa3858e1889552b276d184b8733826efa8ba8fdc2de76b031558daa04736c9ae7850917d6b6c9576f5a0183d809331dcce673f25d5a4c64e15ad7c2265822b78cb490474c72916b09131e0178b2613605b40ae5eb6bad7730903bf697006ae771ce9ba00f0ac036cb56d8a25f6bfeb3a58a45279f3251aadff"}, 0xe4) 20:30:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x20, 0x0, 0x4}, 0x5}}, 0x18) getrlimit(0x0, &(0x7f0000000000)) 20:30:54 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xe) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0xfffffffffffff542, 0x4) r1 = geteuid() setresuid(r1, r1, 0x0) [ 283.475999] 0 pages HighMem/MovableOnly [ 283.480002] 315706 pages reserved 20:30:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="da", 0x1}], 0x1) sync() 20:30:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1000c717b78faafa300f5fc469970000028000008500000000"], 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0xffffff87, &(0x7f00000002c0)="ba58d6fcaccb7ffce16effcfe23b", 0x0, 0xf000}, 0xfffffef1) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x400000, 0x0) 20:30:54 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x151400, 0x100) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x5, 0x9, 0xffffffffffffff49, 0x9, 0x3}) write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x3ff) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) write$UHID_CREATE(r0, &(0x7f00000001c0)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/175, 0xaf, 0x36, 0xf7b, 0xffffffffffffff58, 0x0, 0x9}, 0x120) getdents(r0, &(0x7f0000000300)=""/18, 0x12) r2 = accept(r0, &(0x7f0000000340)=@caif, &(0x7f00000003c0)=0x80) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/75) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x28, &(0x7f0000000480)}, 0x10) r3 = request_key(&(0x7f0000000500)='rxrpc\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)='bdev,-(proc*$\x00', 0xfffffffffffffffd) r4 = geteuid() getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) keyctl$chown(0x4, r3, r4, r5) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r6, 0x0, 0x41, &(0x7f00000006c0)={'raw\x00', 0x6a, "a83c1c4fbff921f2162a45e4bc2127eef40f466cce462d8ee464a6582ccc768534e93217cbf326f05d0908a883ec616fd52058c2363cce246ec3ae3a23ad84d640227f69de246fbf4cdffdc0b00a1d6f31b6dc8c673dff39256edc712045653ae0d346c41ffa72fe3039"}, &(0x7f0000000780)=0x8e) syz_mount_image$ext4(&(0x7f00000007c0)='ext3\x00', &(0x7f0000000800)='./file0\x00', 0x80000001, 0x6, &(0x7f0000000c00)=[{&(0x7f0000000840)="b4e42263e2ec56b67e39e2487cb2322c3758e4790e522a2ae01a5194231c5972791c8f346b298b597eb8db3ce0e3407a7802ed5ec267edc9580f8aa415a67ed019d2b1076289286fa09877c3ebb7d27a460ae1890308a09ab46f5ab2bf8e9190b0fb528a7fa5bfab23db74dacf4b5dbca55f79b22379006591b98b720a8a2e45085a65eea0642133196f7cd921b5a1f1bc7992bc680f221077d35b16614d5a15d9c2ac2de9bd78a236", 0xa9, 0x6}, {&(0x7f0000000900)="26b15593b60b32b52983751fa5abd543c5b521ebb86a8373432357d204d2b6746d6fa926cc46bdb459f3b1356026d47dcedabdc2db3b3b70bbaab48c7d2619a9eea2c4be4d25b18e017a38505ed5a491d2a992bbe50035f58904630c25b031c547272e20d0398e3ac1833ba6f122296b036c99f9a05b6716eb1106189fd1fb07b2b3b4727eec44c04aca35fde8d653", 0x8f, 0x6}, {&(0x7f00000009c0)="17dde8ff426bd897270737af40cab73560a357df3f18055d6d79226969247b030ddf56288179d8dcbbc0586b1ce8974edf9f5b01cdef1c1bc77c6ed52c955159c2f403a83ac915c2f830c4e70f8d567c3bee528365eac90278fbae1192d3a97a4dea71b119a8250a208cd609118030e2c34fb8f9d3d5d2077cdc1bc926d394f17cfb85e39a59403c6d764540427eb4775680dd9b87030eb7693dde16acc5758b40dea76f1df71a1c48fb6bc3ea032fa98269fea00f5be4aaf3902e238cf6d51919d77e5e8341f9e2c20500a8c9eb7d", 0xcf, 0x1}, {&(0x7f0000000ac0)="46495eb59b8849ae8aae5efefa0e633866a2", 0x12, 0x9}, {&(0x7f0000000b00)="0799674f1180e38ac01761419387fb369ee6b7be7a03fea9551f60829e77c257269b9bac9ca47dc11840dceb5a1322b60decdedd3927bbca3889a4d107e27776a52eedfaa8bda595324e35dde89f871223a75e58373eaed35c953f7e5b34eefd3f221a038e4d506f9393120376ef71167fecdc86ca4750a19c7dbe05909b95dc4914025acc", 0x85, 0x9485}, {&(0x7f0000000bc0)="ef8de72a2dd4a2212fc3213b947b494c95560eb41055a4e46f8176d1ab2ee2e3d6aa6fef5a75", 0x26, 0xffffffffffffffac}], 0x1040004, &(0x7f0000000cc0)={[{@nobh='nobh'}, {@test_dummy_encryption='test_dummy_encryption'}, {@data_err_ignore='data_err=ignore'}, {@mblk_io_submit='mblk_io_submit'}], [{@permit_directio='permit_directio'}, {@uid_lt={'uid<', r4}}, {@measure='measure'}, {@hash='hash'}, {@euid_gt={'euid>', r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'md5sum/'}}, {@obj_user={'obj_user', 0x3d, 'raw\x00'}}, {@dont_appraise='dont_appraise'}]}) tee(r0, r2, 0x3, 0x7) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000dc0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x38, r7, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x4004000) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000ec0)={0x8, 0x0, 0x9}) setsockopt$netlink_NETLINK_CAP_ACK(r6, 0x10e, 0xa, &(0x7f0000000f00)=0x638, 0x4) renameat(r6, &(0x7f0000000f40)='./file0\x00', r6, &(0x7f0000000f80)='./file0\x00') getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000fc0)=""/48, &(0x7f0000001000)=0x30) clock_gettime(0x0, &(0x7f0000001040)={0x0, 0x0}) write$input_event(r6, &(0x7f0000001080)={{r8, r9/1000+30000}, 0x16, 0x8, 0x80000001}, 0x18) getegid() open(&(0x7f00000010c0)='./file0\x00', 0x4000, 0x20) [ 283.685591] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 283.726193] CPU: 0 PID: 10275 Comm: syz-executor1 Not tainted 4.14.97+ #1 [ 283.733152] Call Trace: [ 283.735746] dump_stack+0xb9/0x10e [ 283.739295] warn_alloc.cold+0x91/0x1ab [ 283.743273] ? zone_watermark_ok_safe+0x250/0x250 [ 283.748115] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 283.753235] ? avc_has_perm+0x1b7/0x350 [ 283.757220] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 283.762017] ? __vmalloc_node_range+0x390/0x690 [ 283.766697] ? sel_write_load+0x199/0xfb0 [ 283.770850] ? vmalloc+0x60/0x80 [ 283.774220] ? sel_write_load+0x199/0xfb0 [ 283.778370] ? sel_write_load+0x199/0xfb0 [ 283.782541] ? check_preemption_disabled+0x35/0x1f0 [ 283.787563] ? sel_read_bool+0x240/0x240 [ 283.791634] ? trace_hardirqs_on+0x10/0x10 [ 283.795870] ? check_preemption_disabled+0x35/0x1f0 [ 283.800899] ? __vfs_write+0xf9/0x5a0 [ 283.804698] ? sel_read_bool+0x240/0x240 [ 283.808769] ? HARDIRQ_verbose+0x10/0x10 [ 283.812831] ? kernel_read+0x110/0x110 [ 283.818209] ? rcu_lockdep_current_cpu_online+0xed/0x140 20:30:54 executing program 5: mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x9, 0x0, "11e7782c14d67cf52bc74f30501a0aa51ffd01d1012b2da1f0d9e63b8b9341c3029d371ff6aae5b67f0fdf83ffadd2ef4d54728c3387dc769267248ee715606050af64265e79892ef995ae055629ef58"}, 0xd8) 20:30:54 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000100)=0x9) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) fallocate(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') splice(r3, 0x0, r1, 0x0, 0x1000000000000003, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1f) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:30:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 283.823664] ? rcu_read_lock_sched_held+0x10a/0x130 [ 283.828692] ? vfs_write+0x17f/0x4d0 [ 283.832427] ? SyS_write+0xc0/0x1a0 [ 283.836056] ? SyS_read+0x1a0/0x1a0 [ 283.839684] ? do_clock_gettime+0xd0/0xd0 [ 283.843834] ? do_syscall_64+0x43/0x4b0 [ 283.847810] ? SyS_read+0x1a0/0x1a0 [ 283.851442] ? do_syscall_64+0x19b/0x4b0 [ 283.855518] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:30:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/156) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) [ 284.013629] [ 284.015293] ====================================================== [ 284.023124] WARNING: possible circular locking dependency detected [ 284.029517] 4.14.97+ #1 Not tainted [ 284.033129] ------------------------------------------------------ [ 284.039436] syz-executor0/10304 is trying to acquire lock: [ 284.045063] (&p->lock){+.+.}, at: [] seq_read+0xcd/0x1180 [ 284.052252] [ 284.052252] but task is already holding lock: [ 284.058323] (&pipe->mutex/1){+.+.}, at: [] pipe_lock+0x58/0x70 [ 284.065958] [ 284.065958] which lock already depends on the new lock. [ 284.065958] [ 284.074264] [ 284.074264] the existing dependency chain (in reverse order) is: [ 284.081873] [ 284.081873] -> #2 (&pipe->mutex/1){+.+.}: [ 284.087612] [ 284.087612] -> #1 (&sig->cred_guard_mutex){+.+.}: [ 284.093924] [ 284.093924] -> #0 (&p->lock){+.+.}: [ 284.099026] [ 284.099026] other info that might help us debug this: [ 284.099026] [ 284.107158] Chain exists of: [ 284.107158] &p->lock --> &sig->cred_guard_mutex --> &pipe->mutex/1 [ 284.107158] [ 284.118988] Possible unsafe locking scenario: [ 284.118988] [ 284.125286] CPU0 CPU1 [ 284.129941] ---- ---- [ 284.134595] lock(&pipe->mutex/1); [ 284.138215] lock(&sig->cred_guard_mutex); [ 284.145046] lock(&pipe->mutex/1); [ 284.151186] lock(&p->lock); [ 284.154278] [ 284.154278] *** DEADLOCK *** [ 284.154278] 20:30:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/156) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) [ 284.160334] 1 lock held by syz-executor0/10304: [ 284.164997] #0: (&pipe->mutex/1){+.+.}, at: [] pipe_lock+0x58/0x70 [ 284.173144] [ 284.173144] stack backtrace: [ 284.177637] CPU: 0 PID: 10304 Comm: syz-executor0 Not tainted 4.14.97+ #1 [ 284.184553] Call Trace: [ 284.187141] dump_stack+0xb9/0x10e [ 284.190683] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 284.196043] ? __lock_acquire+0x2d83/0x3fa0 [ 284.200368] ? deref_stack_reg+0xaa/0xe0 [ 284.204429] ? trace_hardirqs_on+0x10/0x10 [ 284.208678] ? check_preemption_disabled+0x35/0x1f0 20:30:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/156) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) [ 284.213702] ? lock_acquire+0x10f/0x380 [ 284.217675] ? seq_read+0xcd/0x1180 [ 284.222772] ? seq_read+0xcd/0x1180 [ 284.226394] ? __mutex_lock+0xf7/0x1430 [ 284.230374] ? seq_read+0xcd/0x1180 [ 284.233998] ? seq_read+0xcd/0x1180 [ 284.237621] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 284.242110] ? rw_copy_check_uvector+0x1d4/0x290 [ 284.246856] ? vfs_readv+0xc6/0x150 [ 284.250479] ? default_file_splice_read+0x48a/0x860 [ 284.255487] ? do_splice_to+0xfd/0x150 [ 284.259377] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 284.264823] ? perf_trace_lock+0x11e/0x4e0 [ 284.269059] ? perf_trace_lock_acquire+0x4e0/0x4e0 [ 284.273987] ? HARDIRQ_verbose+0x10/0x10 [ 284.278050] ? seq_read+0xcd/0x1180 [ 284.281672] ? seq_read+0xcd/0x1180 [ 284.285300] ? __fsnotify_inode_delete+0x20/0x20 [ 284.290055] ? seq_lseek+0x3d0/0x3d0 [ 284.293768] ? __inode_security_revalidate+0xcf/0x120 [ 284.298951] ? avc_policy_seqno+0x5/0x10 [ 284.303005] ? seq_lseek+0x3d0/0x3d0 [ 284.306712] ? proc_reg_read+0xf5/0x160 [ 284.310686] ? do_iter_read+0x3e8/0x5b0 20:30:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/156) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) 20:30:55 executing program 5: mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x9, 0x0, "11e7782c14d67cf52bc74f30501a0aa51ffd01d1012b2da1f0d9e63b8b9341c3029d371ff6aae5b67f0fdf83ffadd2ef4d54728c3387dc769267248ee715606050af64265e79892ef995ae055629ef58"}, 0xd8) [ 284.314662] ? vfs_readv+0xe6/0x150 [ 284.318284] ? compat_rw_copy_check_uvector+0x300/0x300 [ 284.325151] ? iov_iter_get_pages_alloc+0x2ca/0xe70 [ 284.330169] ? iov_iter_get_pages+0xca0/0xca0 [ 284.334662] ? default_file_splice_read+0x48a/0x860 [ 284.339680] ? do_splice_direct+0x240/0x240 [ 284.344000] ? __lock_acquire+0x56a/0x3fa0 [ 284.348247] ? security_file_permission+0x88/0x1e0 [ 284.353172] ? do_splice_direct+0x240/0x240 [ 284.357495] ? do_splice_to+0xfd/0x150 [ 284.361378] ? SyS_splice+0xf6e/0x12d0 20:30:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000"], 0x18) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 284.365263] ? compat_SyS_vmsplice+0x150/0x150 [ 284.369841] ? do_clock_gettime+0xd0/0xd0 [ 284.373979] ? do_syscall_64+0x43/0x4b0 [ 284.377938] ? compat_SyS_vmsplice+0x150/0x150 [ 284.382514] ? do_syscall_64+0x19b/0x4b0 [ 284.386578] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:30:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) [ 284.481480] Mem-Info: [ 284.484029] active_anon:86667 inactive_anon:38 isolated_anon:0 [ 284.484029] active_file:18567 inactive_file:16750 isolated_file:0 [ 284.484029] unevictable:512 dirty:113 writeback:0 unstable:0 [ 284.484029] slab_reclaimable:6269 slab_unreclaimable:61944 [ 284.484029] mapped:58734 shmem:47 pagetables:4792 bounce:0 [ 284.484029] free:1383664 free_pcp:383 free_cma:0 [ 284.532510] Node 0 active_anon:346568kB inactive_anon:152kB active_file:74268kB inactive_file:67000kB unevictable:48kB isolated(anon):0kB isolated(file):0kB mapped:234836kB dirty:452kB writeback:0kB shmem:188kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:30:55 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 284.601828] DMA32 free:3011148kB min:4684kB low:7692kB high:10700kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3011884kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:736kB local_pcp:28kB free_cma:0kB [ 284.681063] lowmem_reserve[]: 0 3505 3505 [ 284.692820] Normal free:2525548kB min:5584kB low:9172kB high:12760kB active_anon:346768kB inactive_anon:152kB active_file:74268kB inactive_file:67000kB unevictable:48kB writepending:452kB present:4718592kB managed:3589208kB mlocked:0kB kernel_stack:8576kB pagetables:19020kB bounce:0kB free_pcp:776kB local_pcp:276kB free_cma:0kB [ 284.732173] lowmem_reserve[]: 0 0 0 [ 284.735923] DMA32: 5*4kB (UM) 1*8kB (M) 1*16kB (M) 3*32kB (UM) 5*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 4*2048kB (UM) 732*4096kB (M) = 3011148kB [ 284.751214] Normal: 195*4kB (UME) 109*8kB (UME) 45*16kB (UM) 90*32kB (UME) 462*64kB (UME) 173*128kB (UME) 28*256kB (UME) 8*512kB (UME) 1*1024kB (M) 2*2048kB (ME) 598*4096kB (UM) = 2522756kB [ 284.768710] 35363 total pagecache pages [ 284.772808] 0 pages in swap cache [ 284.776391] Swap cache stats: add 0, delete 0, find 0/0 20:30:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:55 executing program 5: mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x9, 0x0, "11e7782c14d67cf52bc74f30501a0aa51ffd01d1012b2da1f0d9e63b8b9341c3029d371ff6aae5b67f0fdf83ffadd2ef4d54728c3387dc769267248ee715606050af64265e79892ef995ae055629ef58"}, 0xd8) 20:30:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) 20:30:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:55 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 284.784567] Free swap = 0kB [ 284.796706] Total swap = 0kB [ 284.799811] 1965979 pages RAM [ 284.805204] 0 pages HighMem/MovableOnly [ 284.812990] 315706 pages reserved [ 284.822407] SELinux: policydb magic number 0x75622f2e does not match expected magic number 0xf97cff8c 20:30:55 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) [ 284.859766] SELinux: failed to load policy 20:30:55 executing program 5: mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x9, 0x0, "11e7782c14d67cf52bc74f30501a0aa51ffd01d1012b2da1f0d9e63b8b9341c3029d371ff6aae5b67f0fdf83ffadd2ef4d54728c3387dc769267248ee715606050af64265e79892ef995ae055629ef58"}, 0xd8) 20:30:55 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) 20:30:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000"], 0x18) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:56 executing program 5: mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9) pipe2(&(0x7f0000000000), 0x4000) 20:30:56 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) 20:30:56 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) [ 285.125102] kauditd_printk_skb: 264 callbacks suppressed [ 285.125109] audit: type=1400 audit(1549139456.107:23030): avc: denied { map } for pid=10374 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:56 executing program 5: mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) pipe2(&(0x7f0000000000), 0x4000) 20:30:56 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) [ 285.270101] audit: type=1400 audit(1549139456.237:23031): avc: denied { map } for pid=10384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:56 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000"], 0x18) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:56 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000200)=0x1000000, 0x4) 20:30:56 executing program 5: pipe2(&(0x7f0000000000), 0x4000) 20:30:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 285.412825] audit: type=1400 audit(1549139456.237:23032): avc: denied { map } for pid=10384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:56 executing program 5: pipe2(0x0, 0x4000) 20:30:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, 0x0, 0x0) 20:30:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000"], 0x24) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 285.468408] SELinux: failed to load policy 20:30:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, 0x0, 0x0) 20:30:56 executing program 5: pipe2(0x0, 0x4000) [ 285.575000] audit: type=1400 audit(1549139456.237:23033): avc: denied { map } for pid=10384 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, 0x0, 0x0) [ 285.676379] SELinux: failed to load policy [ 285.716633] audit: type=1400 audit(1549139456.257:23034): avc: denied { map } for pid=10381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:56 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:56 executing program 5: pipe2(0x0, 0x4000) 20:30:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200), 0x4) [ 285.811446] audit: type=1400 audit(1549139456.257:23035): avc: denied { map } for pid=10381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:56 executing program 5: pipe2(&(0x7f0000000000), 0x0) 20:30:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200), 0x4) [ 285.919643] audit: type=1400 audit(1549139456.257:23036): avc: denied { map } for pid=10381 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000"], 0x18) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 286.019046] audit: type=1400 audit(1549139456.257:23037): avc: denied { map } for pid=10381 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000"], 0x24) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000200), 0x4) 20:30:57 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 286.165075] audit: type=1400 audit(1549139456.287:23038): avc: denied { map } for pid=10384 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:57 executing program 2: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 286.256685] SELinux: failed to load policy 20:30:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000"], 0x24) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 286.312619] audit: type=1400 audit(1549139456.287:23039): avc: denied { map } for pid=10384 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:30:57 executing program 2: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) [ 286.420716] SELinux: failed to load policy 20:30:57 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:57 executing program 2: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:57 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000"], 0x18) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315"], 0x2a) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:57 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 20:30:57 executing program 2: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) 20:30:57 executing program 2: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 286.966517] SELinux: failed to load policy [ 287.022677] SELinux: failed to load policy 20:30:58 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:58 executing program 2: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:30:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000"], 0x18) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:58 executing program 2: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) 20:30:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315"], 0x2a) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:58 executing program 2: syz_open_dev$loop(0x0, 0x4, 0x105080) 20:30:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) [ 287.314628] SELinux: failed to load policy 20:30:58 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x105080) [ 287.376977] SELinux: failed to load policy 20:30:58 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:58 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 20:30:58 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) 20:30:58 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 20:30:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) 20:30:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315"], 0x2a) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:58 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e6"], 0x2d) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:58 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:58 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$loop(0x0, 0x4, 0x105080) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 287.955229] SELinux: failed to load policy 20:30:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) syz_mount_image$ext4(&(0x7f0000000400)='hxt3\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 20:30:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 20:30:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e6"], 0x2d) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000240), 0x4) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=@random={'osx.', 'bpf\x00'}, &(0x7f0000000600)=""/111, 0x6f) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 20:30:59 executing program 3: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:30:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffffffffffdd3, &(0x7f0000000400)=0x2000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/load\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e6"], 0x2d) setxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(r3, 0x5427) getpid() r5 = creat(&(0x7f0000000080)='./bus\x00', 0xc1) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000001ec0)='./bus\x00', &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f0000001fc0)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)={0x10, 0x37, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1}, 0x20000000) creat(&(0x7f0000000100)='./bus\x00', 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x3, 0xa3, 0x9, 0x9, 0x3, 0x7, 0x5, 0x2f, 0x40, 0x3b1, 0x8001, 0x4, 0x38, 0x2, 0xffffffff80000001, 0xaa}, [{0x70000000, 0x40, 0x2, 0x7, 0x8, 0x3, 0x3ff, 0x1ff}], "ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa9704576", [[]]}, 0x1b0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000600)=0x278) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r6 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, r6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:30:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = memfd_create(&(0x7f00000003c0)='bpf\x00', 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x408000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x2, {{0xa, 0x4e21, 0x100000001, @rand_addr="f8ae16c4765f10512c368740958efe9d", 0xffffffff}}}, 0x88) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) 20:30:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp