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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x840, 0x129) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f00000000c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r4, &(0x7f0000000500), 0x37d, 0x0) [ 2426.720274] audit: type=1400 audit(1575075403.344:253): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:48 executing program 2: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) setsockopt$inet_opts(r3, 0x0, 0x13, &(0x7f0000000200)="07a9", 0x2) fstat(r0, &(0x7f00000000c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet_tcp_buf(r6, 0x6, 0x3, &(0x7f0000000140)="d4f9eafc76e231631f69eb37ad0b4bda41f2b929a4696de7fb1fb9d38f086d0e53502e4bf824378058bb17fd59ba22ed9cf5f9815963ce1735b7505741b8bebc5ef8c4a6f69b6062193a0b72d3f0474065fd6f65672f5479379e16aa369b341d5ce256039ba8c89c97504426054d390af92eb69c82ebd1298854bad453462200c1e5deab91f3e181d08377e5f72616", 0x8f) preadv(r4, &(0x7f0000000500), 0x37d, 0x0) 00:56:48 executing program 4: r0 = dup(0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f00000001c0)="22c2f2d0b077b03b88509cad1212d7d53a89e0ccdb6c2e895be3bbc661ac6608fe86a55fb10df7f8298ce3ecde4c1b5a4fffcad7fdbe7302cdd784b9"}, 0x20) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000040)=""/236) mkdir(0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000180)) 00:56:48 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r2, &(0x7f00000016c0)) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) 00:56:49 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000180)=""/227, &(0x7f0000000000)=0xe3) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) [ 2426.880388] audit: type=1400 audit(1575075403.504:254): avc: denied { dac_override } for pid=516 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:49 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r2, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:56:50 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x10000000000000cd, 0x0) 00:56:50 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) mkdir(0x0, 0x0) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f455ec5c6704c46020000000000000000c4b4"], 0x13) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:56:50 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') listen(r1, 0x10000) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) [ 2427.451290] audit_printk_skb: 15 callbacks suppressed 00:56:50 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0)={0x80, 0x0, 0x0, 0x40000}, 0x0, &(0x7f0000000140)={0x1b4, 0x0, 0xffffffffffffffff}, &(0x7f0000000200), 0x0) 00:56:50 executing program 4: setitimer(0x2, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4580) write$cgroup_type(r2, &(0x7f0000000040)='\x00\x00\x00!\x00', 0x9) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40200, 0x0) [ 2427.451299] audit: type=1400 audit(1575075404.074:260): avc: denied { dac_override } for pid=542 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:50 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4158dfff43e"], 0x13) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:login_exec_t:s0\x00', 0x22, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:56:51 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r2, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:56:51 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x10010000000032) r1 = syz_open_procfs(r0, &(0x7f0000000000)='task\x00') fstat(r1, &(0x7f00000016c0)) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) r7 = syz_open_procfs(r6, &(0x7f0000000080)='stat\b') exit(0x0) preadv(r7, &(0x7f0000000500), 0x37d, 0x0) 00:56:51 executing program 1: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r3) fstat(r0, &(0x7f0000000140)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') accept(r4, &(0x7f00000000c0)=@can, &(0x7f0000000040)=0x80) exit(0x0) preadv(r4, &(0x7f0000000500), 0x37d, 0x0) 00:56:51 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) fstat(r2, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:56:51 executing program 3: mkdir(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:56:51 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) mkdir(0x0, 0x0) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f455ec5c6704c46020000000000000000c4b4"], 0x13) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2427.537949] audit: type=1400 audit(1575075404.164:261): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:52 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa0}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x300, 0x70bd2d, 0x5, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x88}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x20010}, 0x1) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x4) 00:56:52 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r2, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:56:52 executing program 4: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4158dfff43e"], 0x13) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:login_exec_t:s0\x00', 0x22, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:56:52 executing program 4: socket$inet6(0xa, 0x800000000000002, 0x8) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setns(r1, 0x2010000) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="04048a8be18a654508aa0cfac6112be86460daab77b7a3acbbd82901"], 0xb, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000001c0)={0x3ff, 0x5, 0x4a, 0x8, 0x1, 0x800, 0x2, 0x7fff}, &(0x7f0000000240)={0x1, 0x101, 0x1, 0x2, 0x2, 0x8, 0x0, 0x263ac4d6}, &(0x7f0000000280)={0xfffffffffffffff9, 0x96, 0xfffffffffffffffa, 0xda0000000, 0x2, 0x1, 0xffffffffffffff27, 0x2}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000380)={&(0x7f0000000300)={0xeb}, 0x8}) 00:56:52 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x8) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setns(r1, 0x2010000) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="04048a8be18a654508aa0cfac6112be86460daab77b7a3acbbd82901"], 0xb, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000001c0)={0x3ff, 0x5, 0x4a, 0x8, 0x1, 0x800, 0x2, 0x7fff}, &(0x7f0000000240)={0x1, 0x101, 0x1, 0x2, 0x2, 0x8, 0x0, 0x263ac4d6}, &(0x7f0000000280)={0xfffffffffffffff9, 0x96, 0xfffffffffffffffa, 0xda0000000, 0x2, 0x1, 0xffffffffffffff27, 0x2}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000380)={&(0x7f0000000300)={0xeb}, 0x8}) 00:56:52 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 00:56:52 executing program 3: mkdir(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x80, 0x4) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYRES16=0x0], 0xfffffffffffffe77) getuid() execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2427.607489] audit: type=1400 audit(1575075404.234:262): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:52 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r2, &(0x7f00000016c0)) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:56:53 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000180)={{0x2, 0x2, 0x2, 0x2, 0x8}, 0x80000001, 0x4, 'id0\x00', 'timer1\x00', 0x0, 0x5, 0x6, 0x100, 0x9}) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) clock_gettime(0x0, &(0x7f00000027c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000100)=@ipx, 0x80, &(0x7f0000001380), 0x0, &(0x7f0000001400)=""/4096, 0x1000}, 0x1ff}, {{&(0x7f0000002400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002480)=""/186, 0xba}, {&(0x7f0000002540)=""/182, 0xb6}, {&(0x7f0000002600)}], 0x3, &(0x7f0000002680)=""/159, 0x9f}, 0x80001}], 0x2, 0x40000002, &(0x7f0000002800)={r4, r5+10000000}) ioctl$sock_ifreq(0xffffffffffffffff, 0x1df58, &(0x7f0000002840)={'gretap0\x00', @ifru_addrs=@hci={0x1f, r6, 0x2}}) setitimer(0x2, 0x0, 0x0) 00:56:53 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) mkdir(0x0, 0x0) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f455ec5c6704c46020000000000000000c4b4"], 0x13) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:56:53 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000040)={0xfff, 0x40, 0x1, 0x6c4, 0x7, 0x2, 0x81, 0x0, 0x1f, 0x1}) [ 2427.875815] audit: type=1400 audit(1575075404.504:263): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:54 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240)={0xffffffff}, &(0x7f0000000280)={0x4}, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000180)) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r0) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xf37e, 0x20, 0x5, 0xffff}, {0x6, 0x1, 0x2, 0x5}, {0x67d4, 0x0, 0x7, 0x1000}]}) 00:56:54 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r2, &(0x7f00000016c0)) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:56:54 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = getuid() pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r4, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket(0x18, 0x803, 0x0) fstat(r10, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r5, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r8, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r9, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0xffffffffffffffff, r3, r11}, 0xc) 00:56:54 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:56:55 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) fstat(r1, &(0x7f00000016c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) [ 2427.925711] audit: type=1400 audit(1575075404.554:264): avc: denied { dac_override } for pid=567 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:55 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c460200000000000000000003003e0000"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:56:55 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r0, &(0x7f00000000c0)=[{{0x0, 0x7530}, 0x15, 0x7, 0x81}, {{0x0, 0x2710}, 0x16, 0x20, 0x6}, {{r1, r2/1000+10000}, 0x0, 0xfffa, 0x5}, {{r3, r4/1000+10000}, 0x2, 0x3, 0x4}, {{0x0, 0x2710}, 0x15, 0xfac, 0x9}], 0x78) 00:56:55 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000000)=""/50) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr=0x6}, 0x10) 00:56:56 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46020100000100000000c4b40003003e1d4f8a72f29bdb8ea77e294c130621bc599b164a0974609ef22a1738388120857d927718150bb75841aa903a5f3e75b6688d205c750b79fe479212c38a53df989f1737f1a4c6bbafbffe2a4fd339973233083e4373aef3ed8f9f8596f63e2a6c4cf35e6b607db8b36b53e9a589310f4b5463e3c1326c57ed68bd06baebe129f3443f37b52bc00d044f179b34c6437ca13fafccc38b0c138ef3d4261dd1d6d7560199f741b986e473a0afe056b5df5411d4557c574e169e4d72e6df98"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCCONS(r2, 0x541d) 00:56:56 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) mkdir(0x0, 0x0) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f455ec5c6704c46020000000000000000c4b4"], 0x13) [ 2427.988403] audit: type=1400 audit(1575075404.614:265): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:56 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x1f) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x40) 00:56:56 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:56:56 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20004) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000080)=0x2) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:56:57 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) mkdir(0x0, 0x0) memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) 00:56:57 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2428.520853] audit: type=1400 audit(1575075405.144:266): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:57 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) signalfd(r1, &(0x7f0000000040)={0x4}, 0x8) 00:56:57 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000240)={0x4, 0x0, 0xb32, 0x0, 0x0, 0x0, 0xfff}, &(0x7f0000000280)={0xfffffffffffffbf9}, 0x0, 0x0) 00:56:57 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x5b, 0x4) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0xa) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:56:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_getres(0x3, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:56:58 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4602001d000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:56:58 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) mkdir(0x0, 0x0) 00:56:58 executing program 4: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') ioctl$TIOCNXCL(r0, 0x540d) pselect6(0x40, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd, 0x0, 0x3}, &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffffc}, 0x0, 0x0) 00:56:58 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2428.522297] audit: type=1400 audit(1575075405.144:267): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:58 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e72ef80abc48b0faf0255fede51d62dff229518af150c"], 0x13) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0xa400, 0x0) execveat(r1, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x800) r2 = memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:56:58 executing program 4: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x0, 0x1, 0xfff, 0x3, 0x6}) pselect6(0x16d, &(0x7f0000000000)={0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x20000000}, &(0x7f0000000240)={0x0, 0x5ac3, 0x0, 0x0, 0xfffffffffffffffc}, &(0x7f0000000280)={0x2}, 0x0, 0x0) 00:56:58 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f474c4602f743a6670000f91c7dad76150002000000c4"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:56:59 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x7}, 0x28, 0x2) fstat(r0, &(0x7f00000016c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) r3 = gettid() tkill(r3, 0x10010000000032) wait4(r3, 0x0, 0x4, &(0x7f00000000c0)) preadv(r2, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/54}, {&(0x7f0000000500)=""/31}, {&(0x7f00000003c0)=""/220}], 0x100000000000011a, 0x0) 00:56:59 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c460200000000008d0000c4b40003003ec2bd50222baba0f2181223db6246180450742c9d812128bcc6aa7e553fa1fca762ceed2cdcd98cc0ecd338a48db2b9293b83a9b4d406a6c145320cb1e26d449d6b48f4bc984d63bc3b8eb63de934f8f8bfc628f3e84fecb1a3704b2f6373474e5fe35eee2a395ad8f8aa6fd75342f6d0bda1d1a2c0ef0cb4bf6afb4fc48f"], 0x13) execveat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x1800) 00:56:59 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:56:59 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:56:59 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:56:59 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4602000000000002000000390fdd9a4f1c0c2dc9cf00003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) chdir(&(0x7f0000000040)='./file0\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RREMOVE(r3, &(0x7f00000001c0)={0x7, 0x7b, 0x1}, 0x7) write$binfmt_elf64(r2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$RTC_AIE_ON(r5, 0x7001) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2428.607713] audit: type=1400 audit(1575075405.234:268): avc: denied { dac_override } for pid=567 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:56:59 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = gettid() tkill(r3, 0x10010000000032) r4 = gettid() tkill(r4, 0x10010000000032) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="ea44a8ad7e7bd36897a030013167d5ca64fcac56cb940a1f8d38c1c264a364f5bb3270f9b3948d0f6d1afba81369a3941c0d892c649f71f8aa52fdc49da39fd4d59d39cbe5a29fa2320c9384b6225b7344df9087fe0f432862860a9035fd70122441ffea287e19cf660a35fda95134093e84a59f15bdac30bc9b31b130d2ca360c93360e576a341ba8891017c9ebb0", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESOCT], @ANYRESOCT=r3, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR], @ANYRESDEC=r4], @ANYRESOCT, @ANYRESOCT=r2], 0x36) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:56:59 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r0) fstat(r0, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:00 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:00 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)='posix_acl_access#+\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:00 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x2000, 0x0) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1004}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="68fe0000", @ANYRES16=r6, @ANYBLOB="04002abd0c3ab941232df6587000fbdbdf25010000000000000007410000004c0018ffffffff606200"/106], 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r7, r7, &(0x7f00000000c0), 0x2000000ffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = dup(r7) write$cgroup_type(r8, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$cgroup_type(r8, &(0x7f0000000080)='\x00\xee\xe9!\x00', 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000002c0)={@empty, @empty}, &(0x7f0000000300)=0x8) syz_open_procfs$namespace(r9, &(0x7f0000000080)='ns/net\x00') write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x5) [ 2428.673174] audit: type=1400 audit(1575075405.294:269): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:00 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:57:00 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) r5 = gettid() r6 = gettid() tkill(r6, 0x10010000000032) tkill(r6, 0x432) syz_open_procfs(r5, &(0x7f0000000100)='net/netfilter\x00') write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xff, 0x2, 0x0, r4}) write$binfmt_elf32(r7, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7b7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:01 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000080)={0xffffffff, 0x40, 0x9, 0x1, 0x8, 0x9, 0x8, 0x6d5, 0xffffffff, 0x9, 0x5, 0x3f, 0x5, 0x90aa, &(0x7f0000000040)=""/37, 0x6f6c, 0x8, 0x4455cb2c}) 00:57:01 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f0000000180)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) fstat(r2, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0) read(r3, &(0x7f0000000140)=""/26, 0x1a) 00:57:01 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2432.751361] audit_printk_skb: 93 callbacks suppressed [ 2432.751369] audit: type=1400 audit(1575075409.374:301): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:01 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f459246020000000008000000c4b400030004c91d54a5efc5c2b4180b8e185cb3e0e1bda195f6995860c5128ccdd1a3ca35a6bb696e2d92a10e5ae38eb110a89f8ae6947d687beececbd6f345eb5703267c9cf92371050000000000000000e0de517065cb5304000005a5db26c7929af4943b414d"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fallocate(r0, 0x19, 0x10000, 0x401) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:01 executing program 3: mkdir(0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='-\x00'], &(0x7f0000000340)=[&(0x7f0000000180)='-\x00', &(0x7f00000001c0)='-\x00', &(0x7f0000000200)='-\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='system\x00', &(0x7f00000002c0)='lo\x00', &(0x7f0000000300)='\x00']) r0 = memfd_create(&(0x7f0000000040)='-\x00', 0x8) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4660029282d473e05902000000000000"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:01 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:57:02 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x33, @broadcast, 0x4e23, 0x1, 'rr\x00', 0x1a, 0x8f5c, 0x7c}, 0x2c) mkdir(0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:02 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7fe76339aae0403308c5b41c1e454c46020000000000000000839b1954d2b6b76ec4b40003003e9718c677ebee802465659428f1eee9978cd898b71d18a6ccbc775661dd202b0992a41f"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:02 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:02 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) [ 2432.824197] audit: type=1400 audit(1575075409.444:302): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:03 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = accept$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x381) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000100)={0x73e9, {{0xa, 0x4e21, 0x8, @local, 0x1}}, 0x1, 0x1, [{{0xa, 0x4e21, 0xfffffff8, @mcast1, 0x401}}]}, 0x110) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x5, 0x2, 0x3, 0x3, 0x8, 0x800}, 0x20) 00:57:03 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46020000000000000100c4b40003003efa1aaaf23f65b90475bdc4a134e4ee70f535126a88b6cb2916427b9688967e607c7947445a042b81ed1ccaa53afa0961442c39869b75c1f4270f4426a142dc049869e89d6947ed5db6f3ba84eac1260914c23d1140d83ae496b61a0df84a534c1f7dfa9f29867ac1947e6510c4b02207ea8ddf435a060e3717d3602525f807cff53152a5965f062c2d561e20f8991a5d79395c8ce5845530e52a33017c145eaa237972d2dcf3256fc25c8830f8c2827668f6ad32387026fa1df1bbdf227745733152e4639b2bfeb13c048672699e5ee04a3c54486fd29039ccec77b863d4715149351dc0c852f877b4a465592306dcfeb6b776469b8a777b6e287acc76a4afeb652a400d9ade89706998f6d6f86fd6bc1bafdad86bc9205b2b2a99ceec331fc6e099f7abe202eddbeb1fe5c2301f88f5cc1fd715300a55474144a5cb2d8a4b0d9e922ab9000fa411d8dca171111ec7ef4642ef20cda871762ff72984f1a201936db62af8eb890bb4123d9af2bf1a8d231139ba0a6d2f"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000040)=""/44) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:03 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:04 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) [ 2433.205569] audit: type=1400 audit(1575075409.834:303): avc: denied { dac_override } for pid=790 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:04 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:04 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%ypuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:04 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c460200000000000000154800c4b40003"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:04 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='q\x03\x00\x00\x00:\xc2s3\x86c\x06\xbf\xc2\x84Oc\x02\x8cZ\xa2\xf8\xa1\x82\xcb\xb7\x83|\x8d\x01 \xcf\xfb\xeeh\xc9\xeb\xda%\b\x00\x00\x00\x1cy\xd5\xb0\x8a`t\xe6\xfba_B\x7f\xc1\x82\xb3\x8b\xca\xef\xae\x1cj\xfayP\xb0\n,O\x81\x86\xf8$\x94\xf3\xb0#\xa8\x11\xa3=~z\xb6\xc2\x15\xa27O\x99]\' b\xe9\x1d\x0eUo$\xa7B\x1c6\xc1w\x94\xd5|\"N\x81j2\x1aj\xd3+\x9b\xb1\xbf\xe2\x91P\x06\xa3\xa7|\r\xb9\xe2\xf4\xff[8\xbf\xb4\x03\xfe\xceN\x8d\xe5\x1f\x1b\x8a\xc38') r2 = socket$inet6(0xa, 0x6, 0x7) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000040)={0x30, 0x27, 0x14, 0x11, 0x6, 0x9, 0x0, 0xd6, 0xffffffffffffffff}) finit_module(r2, &(0x7f00000000c0)='keyring,\x99+trusted$nodevcgroupbdevem0GPL$%eth0nodevvmnet1}\x00', 0x1) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:04 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10101, 0x8) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4f4ebb52dec76af) dup(r0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454cd1000000000000000000c4b40003003e"], 0x13) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:05 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2433.255739] audit: type=1400 audit(1575075409.884:304): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:05 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xe, 0xa, 0x5, 0x73, 0x68, "f2614718b18d71496c385d10635d4ea038b3ac336378be42880dc954cf0af75c59d07ff83265cf3b14d4562ef7caa936daa4466281e84a32ca81ec2aa5a7338b2192d7f0ec0139fe1b4068076555b18a9a1e25bf1346cca7a1e46f832106bc0f115dc4d584d4a5f0"}, 0x74) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) 00:57:05 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x842, 0xcae0}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c465eba26020000000000000000c4af008a5f15333bc94fbc8b44164c42da0eb69d0908d92d8596f29fce52daeffa43d97978252b62205f33197b0689bb0ab68c4c042ae57f6c4f02de991656b0ade9358796f98965eb5bba370247596309fca9c0b0abc1457e9e22eaf20ab423e8253e25cb4657ef41279e957565a362d7a1b65a7cb2ca0a6bd9c4314d3a0d48caad3e032446bb315427cdf1a9f0ff990600"/187], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:05 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = dup3(r0, r2, 0x180000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) 00:57:05 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) [ 2433.479470] audit: type=1400 audit(1575075410.104:305): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:06 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:07 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:57:07 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000016c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) mmap$binder(&(0x7f0000ff5000/0x8000)=nil, 0x8000, 0x1, 0x11, r2, 0x1) exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 00:57:07 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='!.,/!cpvse\x80\x84\xbe\x90\xc7JqUb\xcf\xa1\xd3;\xb5en^\x85\x8b0\x00\x94;\xba\x10\x0e\xca\x12\x97A\x19\xa5\xa3\xccs\xc0\\_Hm\x11\x96\xa8\x8f\x99n\x15\x1a\xa3\xae\xaa\x01\xcc\x87jy\x0f\xb7c\xde\xdd7\x86\x86\x87\xa69zv\x9e\xb9v.W\xac]yt\xc3\xb4\xfdy\xcb-uy\xfb\x1f\x12\xa49(\xa9\xe1\x8f\xf9azW\x8a\x8cxw', 0x1) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:07 executing program 4: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = socket(0x1, 0x80000, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1000001, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0x1, 0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x7}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='$.6/%cpuset]\x00', r2}, 0x30) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r3) r4 = dup(r0) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = ioctl$TIOCGPTPEER(r4, 0x5441, 0x2) ioctl$TIOCGSERIAL(r5, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/24}) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:57:07 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:07 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) mkdir(0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="5f454c46020000000000000000c4b40003003e21f3ccbabfa0f4bd22824281457f94d83d78f2689585258d11c9b35b157f06e1d0e1a3c8aace3f877e19a6325a62477edbfa302be62e588195f7f1b13b8cb598479692dacf7e8cc647aa7d06883a17ca1a51cda3ec3c917db4b7f82a43f8c60f0167a816cc7b2f3900"/135], 0x13) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2433.552352] audit: type=1400 audit(1575075410.174:306): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:07 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000100)={0x8, 0xffff, 0x8, 0x45d2, 0x5, 0x8000}) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r5) fcntl$dupfd(r0, 0x0, r5) r6 = dup3(r1, r4, 0x80000) ioctl$EVIOCGMTSLOTS(r6, 0x8040450a, &(0x7f0000000040)=""/192) 00:57:07 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:08 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff5}, 0x0, 0x0) 00:57:08 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = fcntl$dupfd(r1, 0x0, r3) socketpair(0x0, 0x80000, 0x78, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='\xd2ask\xff') fstat(r6, &(0x7f00000016c0)) r7 = epoll_create1(0x80000) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r8, 0x0, 0x2d, &(0x7f0000000800)={0x200, {{0x2, 0x4e20, @empty}}}, 0x88) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r10 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x2) write$binfmt_elf64(r10, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r10, r10, &(0x7f00000000c0), 0xffffffff) execveat(r10, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r10) r11 = dup3(r7, r10, 0x180000) fcntl$notify(r11, 0x402, 0x1c0f928bee6c6e98) write$binfmt_elf64(r9, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r9) fstat(r9, &(0x7f00000000c0)) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_mtu(r12, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) exit(0x0) preadv(0xffffffffffffffff, &(0x7f0000000b40)=[{&(0x7f0000000240)=""/41, 0x29}, {&(0x7f0000000680)=""/193, 0xc1}, {&(0x7f00000009c0)=""/72, 0x48}, {&(0x7f0000000280)=""/32, 0x20}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000000780)=""/5, 0x5}, {&(0x7f0000000a40)=""/69, 0x45}, {&(0x7f0000000ac0)}, {&(0x7f0000000b00)=""/51, 0x33}], 0x9, 0x800000000000000) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000200)=0xc6) r13 = eventfd2(0x4, 0x800) write$binfmt_script(r13, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x10f) 00:57:08 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:57:08 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2433.666580] audit: type=1400 audit(1575075410.294:307): avc: denied { net_raw } for pid=809 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:08 executing program 4: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:57:08 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:09 executing program 3: mkdir(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = memfd_create(&(0x7f0000000140)='(', 0x1) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYRESHEX], 0x12) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:09 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:09 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) 00:57:09 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xc4) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f00000001c0)=0xc) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000003c0)=0x0) lchown(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r4, 0x0) getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) r6 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r7, 0x0) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x242000, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB=',default_permissions,max_read=0x0000000000000005,defcontext=root,smackfsdef=(ppp0-vmnet0(,euid>', @ANYRESDEC=0xee00, @ANYBLOB=',smackfshat=&!{em0cpuset(@$,permit_directio,fowner>', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f747970653d76626f786e657431286e6f646576766d6e6574302c0049e65b7c689683a8e0449cbb7bd5f0ce77722728bbd01ae2d5912a257ac630bbe7b8e2aa80bb0dd8f948e6bc9481e0405f8f01ac47c8af238e2c0b825fdc2a02f7f45e38456ae0b4e6d14006325ce601b7e839b8369140eed5da8b899c6341115c1bebdddfbaf91feca1"]) 00:57:09 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) fstat(r0, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:57:09 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='system{keyringwlan1\x00', 0x2) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r0) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x17b2b10aa301f76e}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r4, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4c18a}, 0x2) [ 2433.777747] audit: type=1400 audit(1575075410.404:308): avc: denied { dac_override } for pid=813 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:09 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:10 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = gettid() tkill(r1, 0x10010000000032) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x17) execveat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1400) memfd_create(0x0, 0x2) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000), 0x10) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:10 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) 00:57:10 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:10 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x2100, 0x52) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x7ff, 0x8}]}, 0xc, 0x2) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCNOTTY(r2, 0x5422) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe2e3}, &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:57:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@empty, @in=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000040)=0x106) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f00000001c0)) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000640)='tls\x00', 0x4) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:auditd_etc_t:s0\x00', 0x22, 0x3) r6 = accept4(r3, &(0x7f00000002c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000340)=0x80, 0x800) writev(r6, &(0x7f0000000580)=[{&(0x7f0000000380)="a54d9ab81d3057afa4e5c8878d42a1ee811c18c62a261341abc486c56ea40f628dbdd643afb5d9073824c9cefce96083ab87e5f733054feca7e2b77d75574f39c7beabb3e1df7299be1ef79f66942fa73f217d637493fbcc8785bd6938997db8dcbbaead43d886f188932f7f393ec8fa69cf385bbaec8da64eef6f4637988a5a83de1b11f078501c4964d8347f0993fb33677b6d523ada3ef5e8d6b3af73734926904b422c07a24036a24a7a03e2719dbe3c4bbe8bbdc590e179689cc25d54f6700fc412244001cfcc9efef61f380e72cadd907c5c924560d0c06dade5af5acf5907ac3ff69e12f856abc4b6d0c48ff1d8398ba9bc12f51d40708623", 0xfc}, {&(0x7f0000000480)="329f50db3c2df7596065f4dcd66b4a786c248bec8eb7d466b213c6e012805734c1c7b642343c7033c5fdbbae0744154753ed3d4bc46df13d477d1808203602bc4f922a8b35108eff78ec45fc84a89b11b7d86cbc792370f6f4e87f2b8678751d4901de2583416eba79e3995f76021d03c64089c8f918073f605d407082a1bd6c5328326ca20e88cee7134ceda380f311b1e38199ced4d21ceae418e8871f799f9101d16c02f0ee8fae474064c14c49b9b8b0923c3488c93ed7a69ebea7d69c6078f301d53e5cc43b415b7b075641ce54e63018955985069406873a9b0888c7598c1281bf9945898ea3e5d1", 0xeb}], 0x2) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r7, r7, &(0x7f00000000c0), 0xffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = dup(r7) write$cgroup_type(r8, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f00000005c0), &(0x7f0000000600)=0xc) [ 2433.940155] audit: type=1400 audit(1575075410.564:309): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:11 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:11 executing program 1: r0 = memfd_create(&(0x7f0000000140)='-*\x00', 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e33c69d06c8609dfb078d73b92a286293af3b7bb110d509d66ab612815bf94fda8e25b9d8ff5cc791df7943a492e6e0dc0ceb902348c482092aabdc19591998caeeefda73c0a2181befe9edf96da2087e7c030b7bb3d16d6076e1ccb935e9d88800936e4c21081da47c99f84b44bbac5f312f647ac461486be4114a"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x3) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:11 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) 00:57:11 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x20000) r0 = timerfd_create(0x3, 0x1800) fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:11 executing program 4: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x3f) pselect6(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x80, 0x0, 0x6}, &(0x7f0000000240)={0x89, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1}, &(0x7f0000000280)={0xfffffffffffffff9, 0x1, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0) 00:57:11 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r4) r5 = gettid() tkill(r5, 0x10010000000032) r6 = gettid() tkill(r6, 0x10010000000032) r7 = gettid() tkill(r7, 0x10010000000032) write$binfmt_elf64(r0, &(0x7f0000000e40)=ANY=[@ANYPTR64=&(0x7f0000000dc0)=ANY=[@ANYRES32, @ANYRESHEX=r6, @ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYPTR, @ANYRESDEC=r7, @ANYPTR64], @ANYRES32=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000cc0)=ANY=[@ANYBLOB="53144a4faa6a0665d4c78f73c23f44295289cb61ece66355c1dc6002e1b515da152bd4c8e539d629d85797436e5b5f7cbe6c855fb566eaad8292fafcc7bae2c2643f4b6ecb461f2f70b2af600c0e7d014618df91c621a8b390f723c44773a983e0280433e3570d7b70707b206f700ba0e26b0d5fbb61897720c62fd7697b0e715ec4cb8f17134da583dbd39141e0913118e92809547addfc5effb3d834f85a063be8afd4e50fc1f6601be70934aef7ff65c2d08e12be32", @ANYPTR64, @ANYRESHEX=r0], @ANYRESHEX], @ANYBLOB="abef34f0de9ac2badaeec8956d5ae5c18d1be0f627abab705a1830374d16b9ce4ba6e62940c686ec4f16a696fa441ab02190f6094054109aa99a89c7798da561bba91ab9b35d12a0c56c45194854d57f8c01488d563defc4e8621d7a66830fb9d19960b1abe36e99ce28172fe884b87929a5f62a802e27af6324f5406db7ab94c67fd061cef6b0dd580133f5a323a3337d3a58b137f8a010edcfd455101ba64584617f96ed8528620ba1b8460f07cb809683793d058c0266537fd9680b623b3fd302edc07277afa758467b9e60cfde746824e9748b9289128cfe00f0e9c0bee0", @ANYRESOCT=r7], 0xff) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) dup(r3) r8 = dup3(r2, r3, 0x0) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r10 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r10, r10, &(0x7f00000000c0), 0xffffffff) execveat(r10, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r11 = dup(r10) write$cgroup_type(r11, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r11, 0x0, 0xd, &(0x7f0000000280)='trustedwlan0\x00'}, 0x30) r13 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r13, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r13, r13, &(0x7f00000000c0), 0xffffffff) execveat(r13, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r14 = dup(r13) write$cgroup_type(r14, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x3, 0x6, 0x4, 0x0, 0x0, 0x400, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x80dc3af25e0e362f, 0x7, 0xffff8b49, 0x5, 0x7, 0x3, 0x7}, r12, 0xc, r14, 0x1) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='a', 0x1, r9) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r9) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @multicast2}, &(0x7f0000000080)=0xc) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:11 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:11 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000080)={0x4, 0x66, &(0x7f0000000000)="9e55634d78173c45db1b5b743ece6ee98528bb3fe47a378b9f44c413acb09c17d7a2c1cc29b6f49e9c9d97f48ce2882406bd47c7a12e3be5ed1ffd7bcd9ddc21700b1093d0e25abcd29e9937755b46aaffeeabfb8c4df7b33a9e8d41dfc44b03f6fdce31280e"}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x3, 0x392, [0x0, 0x200002c0, 0x2000038e, 0x20000622], 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x9, 0xbe97d27b1b6527a6, 0x201, 'tunl0\x00', 'gretap0\x00', 'bcsf0\x00', 'nr0\x00', @empty, [0x0, 0x1fe, 0xff], @link_local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0x1b, 'vxcan1\x00', 'veth0_to_team\x00', 'rose0\x00', 'hwsim0\x00', @local, [0x0, 0x7f, 0x0, 0xff, 0xff, 0xff], @random="3a74585cb741", [0x101, 0xff, 0x7d928ea8db871052, 0x80, 0x0, 0xff], 0xf6, 0xf6, 0x146, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x6, 0x5}}}, @limit={'limit\x00', 0x20, {{0x10000, 0x8, 0x66, 0x7f, 0x1f}}}], [], @common=@log={'log\x00', 0x28, {{0x9, "c9d1fdbff35bb5bf354cf09c7013fd1b5ca23c7e48314a3bfecfd4bb96e1", 0xc}}}}, {0x11, 0x20, 0x4431, 'team_slave_1\x00', 'nr0\x00', 'vlan0\x00', 'veth1_to_bridge\x00', @empty, [0x0, 0x0, 0x0, 0x7f, 0xff, 0xff], @local, [0x7f, 0xff, 0xff, 0x0, 0x0, 0xff], 0xee, 0xee, 0x11e, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x4, 0x4}}}, @connbytes={'connbytes\x00', 0x18, {{0x2, 0x3, 0x0, 0x2}}}], [], @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x40a) [ 2434.007929] audit: type=1400 audit(1575075410.634:310): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:12 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCGPTPEER(r3, 0x5441, 0x80000000) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) signalfd(r5, &(0x7f0000000040), 0xfffffcdf) 00:57:12 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:12 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:12 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:12 executing program 3: mkdir(0x0, 0x8) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:13 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000080)={0x81, 0x20, 0x401, 0x400, 0x8}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$char_usb(r3, &(0x7f0000000180)="6646c04865ad731a16b3f5d775f686b74b87a09c650260903e9f712e18d6928b23f3122c609ca760eea6d8d509841eaa0e44f1a3175f06689adee74e8c49138b63d90a51161838c3e7fa815aa1ad31b55bd2370f91df3b3ff5a757715cc6e83995c63b6ce769d51ca4b6333fabd34469c710acf1faffb045f3bc42d6b3ff9b90d63912857b7f32e8df9f591372c3be0d8f655cdad346235867bae4fe2dcacbc350efc5af53fd1bf6f9739adc7196093a04cd2fb15e579d6d4887f4a9450f066b24228b45dfb1f3dfc552db9664ae83afb542510d60890e34a281de4c", 0xdc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:13 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2435.070125] syz-executor.2 (812) used greatest stack depth: 22616 bytes left [ 2437.805300] audit_printk_skb: 96 callbacks suppressed 00:57:13 executing program 3: mkdir(0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = gettid() tkill(r4, 0x10010000000032) r5 = gettid() tkill(r5, 0x10010000000032) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r6) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r7, r7, &(0x7f00000000c0), 0xffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = dup(r7) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r9) r10 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r10, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r10, r10, &(0x7f00000000c0), 0xffffffff) execveat(r10, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r11 = dup(r10) write$cgroup_type(r11, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r12 = gettid() tkill(r12, 0x10010000000032) r13 = gettid() tkill(r13, 0x10010000000032) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX=r4, @ANYRES64=r0, @ANYRESDEC=r6, @ANYBLOB="4355436bcf449e00933f3e31d061253e155463dc8fdb98f44726e92b089e11bd9cf456b383b29bc34dd37389713b96a868a6f33e764d56aa47d92b3add275ce459125112240b84ee31c995dbf477ecb9905eeac3290a9d74c7adeebebe995b97776df39fbe92ebc3d14f9978534d8f95780f8a61bd1b325fed867de1d278a3bff65939afd6e8091c", @ANYRES64=r7, @ANYPTR, @ANYRESHEX=0x0, @ANYRES64=r1, @ANYPTR64=&(0x7f0000000200)=ANY=[]], @ANYBLOB="4250df7a363cd60c369f3613909bcddf253c700fd3b616061b9407fb211987890c90d6d6de289511cbe15c278f9aa4d2fd5497c8fb4d939dedc7a50a4182d44b1e33e58d9160c0f85f037d687170632e6aa5f4b61747c78dd9243233e58f9d7d05585ad4749914044e0eae95c49a6627b7ec56955af9fc0787a9510b8a05aa7de5aab1883854742261037c5446ede4d1ef3933883c0c8efe66bc3548a059477b650ad9556b54e71fc7e9cb6a098508e825e4b12848321efe7d890f0aa608b4494fdb5327bb28a225b1577f19c10d7b6def5025e221b2e7322cff316c9232814537279e1ea74c609691fada61c2741b", @ANYRESDEC=r11, @ANYRES32=r12, @ANYRES16=0x0, @ANYRESHEX=r8, @ANYPTR=&(0x7f0000000340)=ANY=[], @ANYRESOCT=r13, @ANYBLOB="bd18e38ffa4724587570e7c200f9ff49ac975157e11a869831441e914f0f2b09cbb4e31cebf5203e6c44fdaf5b52552b8ed864151363da17ee71308f41cf3125ee0a3cfdb4be7acfbc4f4fdc4e20520a0af24d0e95b6b1fdc47d65d32d2bb08653fcae98522684"], 0x1a9) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2437.805309] audit: type=1400 audit(1575075414.434:343): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:14 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) fstat(r1, &(0x7f00000016c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r3) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={r5, 0x0, 0x2, 0x1ff, 0x4}) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) 00:57:14 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80400, 0xc2) symlinkat(&(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00') write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c460200000000000000ffc4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r5, 0x10, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x45e}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40920}, 0x80) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r2) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000180)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0x34f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r8, &(0x7f0000000200)=""/250, 0x50c7e3e3) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r8, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = socket(0x18, 0x803, 0x0) fstat(r14, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r9, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r11, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r12, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r13, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r15, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) chown(&(0x7f0000000040)='./file0\x00', r7, r13) 00:57:14 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:14 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2438.022151] audit: type=1400 audit(1575075414.644:344): avc: denied { dac_override } for pid=949 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:14 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:14 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='bcsh0\x00', 0x10) 00:57:15 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:15 executing program 3: mkdir(0x0, 0x80) r0 = memfd_create(&(0x7f0000000140), 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4602000000000000ac0000c4b4000300"], 0x13) umount2(&(0x7f0000000040)='./file0\x00', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:15 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:15 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000000c0)="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") preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:15 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4606060000000000000003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2438.357584] audit: type=1400 audit(1575075414.984:345): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:16 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:16 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r4) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:16 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa800) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000000c0)={0x505, 0x20, 0x1, 0x9, 0x10, 0x1, 0x40, 0x6, 0x2, 0x4, 0x2, 0x9}) fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@random={'user.', '/dev/input/mice\x00'}, &(0x7f0000000140)='stat\x00', 0x5, 0x3) exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 00:57:16 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2d28) ioctl$KDSETMODE(r1, 0x4b3a, 0x8001) memfd_create(0x0, 0x0) setsockopt(0xffffffffffffffff, 0xd66, 0x9, &(0x7f00000000c0)="a9977ab5c62757bfff60b2fc52b5ffeee2fd021b1f3153c495a363bc0d2549983e45256d97a81e8362b7b835ea6c28b464f223636ff3ae2c77c636b63a51a12cbc36b53332010053713849d47edf4231ed1900100cc3c94630ef40ef302e172d015173aa816786f7a13359790740", 0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) init_module(&(0x7f0000000040)='security$trustedselfvboxnet0eth1systemeth1\x00', 0x2b, &(0x7f0000000080)='$.6/%cpuset]\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:16 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2438.363456] audit: type=1400 audit(1575075414.984:346): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:17 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:17 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'nlmon0\x00', {0x2, 0x4e21, @remote}}) 00:57:17 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:17 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:17 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:18 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xb6) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:18 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:18 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2438.908684] audit: type=1400 audit(1575075415.534:347): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:18 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) finit_module(r2, &(0x7f0000000040)='$.6/%cpuset]\x00', 0x3) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYBLOB="4d9dfa59aece97352a9afc355725e12eba82e61d4c707a83c9964d04291e895661e4466bf1a933ff84220df30b901414db85c7488ca06de9241d48c58d9335ec93fc6ea1ad85fad860d69e88686ba1253e531fb02ad071bb449d57908d9ff4a23e17d6aad22f5128140f428aa1f8cd3064e9f786dd2585cfc2f37e323e891ed6fba9e5736b1b4122f4365a068e858b8e6853a68da0c834928adedb8c0ea5227db627afdf5e3988c2710c7580eee0aab64dec15ecf31331916031c3d08328362d6b1c35a1b7419f6b4b76b8e55766b13145352e7c9230a67d5ebc13ac0071988524268812ce895c9aa643f456", @ANYRESHEX=0x0, @ANYRESOCT=0x0, @ANYRESOCT, @ANYRES16=r0, @ANYRESDEC, @ANYBLOB="9a4b314e14a788cc08672f81c2f9d4285817fc7a82fed4c3d9ef4d2ca484e403075c75dd82a034dd5f67bd24a2cba4ff10e1cf50510a566e3c8c6fc4d0685c5806c092864ee5a41b3500f87d82cc8d553b2ddb858dfafe69d5a8c1dd8d12d3014bb8198f847d86252f4de2ecac56c6aca40a029704c2df55ab4be45bee02bc3f9df4ffd18f0a1e34ec41118ae57a70248d9f8f3fd3ef6c8bd429514b551cde6a31d60366e94fba7c22853edc069f06e0663c3519939f5531dd", @ANYRES64], 0xd81ed930a5bd57ce) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:18 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:18 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:18 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40000003a"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='a', 0x1, r1) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sd\x1c', 0x1}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='a', 0x1, r2) keyctl$get_keyring_id(0x0, r3, 0x0) keyctl$negate(0xd, r3, 0x9, 0xfffffffffffffffd) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:19 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:19 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:19 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@loopback, @multicast1}, &(0x7f0000000180)=0xc) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000240)={0x5, 0x4}) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYRESHEX], 0x12) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r2) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x7) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:19 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r2) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0xffff, 0x4, 0x7}) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) [ 2438.910330] audit: type=1400 audit(1575075415.534:348): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:19 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:19 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:20 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460200000000609d0000c4b40003003e6872c37ca53d5d7109038b7797325606c05583a563790000000000003565b98c74b283ad267483de687412d85912af9850766b8a1c19176ab223a725fb219b407b294a30658d00000293cc4dcb03593bcdcefd9ba97cbafa5b7e2e0e8c6057da0e6dbb"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1000) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000280)=0x3) r4 = dup(r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$cgroup_type(r6, &(0x7f0000000240)='\xeb\b\x00', 0xffffffffffffff61) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000040)) 00:57:20 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:20 executing program 3: mkdir(0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x30de) r1 = memfd_create(&(0x7f0000000040)='rsysime_type@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe93>\x7f', 0x2) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e2e5cd69cdcf09b31c881f8"], 0x13) r2 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r3, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x1}, [{0x2, 0xa, r3}], {}, [{0x8, 0x1, r4}, {0x8, 0x3, r5}], {0x10, 0x9059fc24f840581c}, {0x20, 0x4}}, 0x3c, 0x1) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) read(r1, &(0x7f00000002c0)=""/9, 0x9) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = dup(r6) write$cgroup_type(r7, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$EVIOCGKEYCODE(r7, 0x80084504, &(0x7f00000001c0)=""/241) 00:57:20 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='task\x00') arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000100)) fstat(r3, &(0x7f00000016c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f0000000040)) preadv(r4, &(0x7f0000000500), 0x37d, 0x0) [ 2439.139574] audit: type=1400 audit(1575075415.764:349): avc: denied { dac_override } for pid=991 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:20 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:20 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:20 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x408400, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b4255491fb"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) gettid() memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:21 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/504], 0x3c) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/access\x00', 0x2, 0x0) fcntl$setlease(r2, 0x400, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r1) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = accept$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) read(r4, &(0x7f0000000100)=""/143, 0x8f) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r5, &(0x7f0000000500), 0x37d, 0x0) 00:57:21 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:21 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0xfffffffffffffc5f) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:21 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) [ 2439.226184] audit: type=1400 audit(1575075415.854:350): avc: denied { sys_admin } for pid=2061 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:21 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c460200734c324a1d3de1df01a8713afefd649eccc8f6be7cfa00"], 0x13) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "f1d71f4a0047950e6bd053d6fd4c4587"}, 0x11, 0x3) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) execveat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 00:57:22 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:22 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000a00)={0x1, {{0x2, 0x4e20, @rand_addr=0x400}}, 0x1, 0x5, [{{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @empty}}]}, 0x310) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:22 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x9, 0x5}, &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000fdbff8)=[{&(0x7f00000025c0)="290000002100190000003fffffffda260200000000e80001040000040d00140000000000132eb75c35", 0x40d}], 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r2, 0xc, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xd, 0x8001, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18840000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x108, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x1c}}, 0xa0) 00:57:22 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0)=0x800000000000008, 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r2 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) fstat(r2, &(0x7f00000016c0)) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@random={'security.', '/selinux/validatetrans\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='attr/sockcreate\x00\xdc\xd3\xd4h\xcc\xe4\xa7(p\nO=\xfcz\x02w\x93y\xd0L\xd7\xe5\x14\xce') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:57:22 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) ioctl$PPPIOCDISCONN(r3, 0x7439) 00:57:22 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000240)={0x0, 0xc822}, &(0x7f0000000280)={0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x72b}, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x2, 0x8, 0x3bca, 0x2}) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x100, 0x0) 00:57:23 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) [ 2439.228714] audit: type=1400 audit(1575075415.854:351): avc: denied { net_admin } for pid=2061 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:23 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:57:23 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) 00:57:23 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c01e36c5a73d6af9ab69c1bd6cc0000000000000000b7b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) 00:57:23 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:23 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') setsockopt$sock_timeval(r0, 0x1, 0x1e, &(0x7f0000000040), 0x10) fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r2) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x6) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:23 executing program 4: 00:57:23 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sysinfo(&(0x7f0000000a00)=""/4096) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:23 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:57:24 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f0000000240)={0x0, 0x0, 0x300000, 0x0, 0x4, 0x2, 0x0, 0x100}, &(0x7f0000000000)={0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x80, 0x0) accept4(r0, &(0x7f0000000100)=@ipx, &(0x7f0000000180)=0x80, 0x0) 00:57:24 executing program 4: epoll_create1(0x0) epoll_create1(0x0) timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet(0x2, 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x40, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') pipe2(&(0x7f0000000140), 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x800, 0x90) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 2439.776138] audit: type=1400 audit(1575075416.404:352): avc: denied { net_raw } for pid=1026 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:24 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x3d9ba6dbb029368b) 00:57:24 executing program 5: 00:57:24 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') pipe(&(0x7f00000000c0)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000180)=0x2) fstat(r0, &(0x7f00000016c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) signalfd4(r4, &(0x7f0000000040)={0x5d35}, 0x8, 0x80800) 00:57:25 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000080)={0x2, 0x6, 0x8}) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) socket$key(0xf, 0x3, 0x2) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r4) ppoll(&(0x7f00000000c0)=[{r1, 0x1000}, {r3, 0x10}, {r0, 0x8}, {r4, 0x8}], 0x4, &(0x7f0000000100), &(0x7f0000000140)={0xfffffffffffffff8}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x6, 0x2}, 0x10) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:57:25 executing program 5: 00:57:25 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:25 executing program 5: 00:57:25 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = gettid() tkill(r5, 0x10010000000032) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = dup(r6) write$cgroup_type(r7, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r8, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r8, r8, &(0x7f00000000c0), 0xffffffff) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r8) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r11 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r11, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r11, r11, &(0x7f00000000c0), 0xffffffff) execveat(r11, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r11) r12 = gettid() tkill(r12, 0x10010000000032) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRESHEX=r0, @ANYRES16, @ANYRESDEC=r12], 0x1a1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2442.935064] audit_printk_skb: 99 callbacks suppressed 00:57:25 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x19c, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xa20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10ff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x34}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x29, 0x18}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x43}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x2}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x10000}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x10}, 0x4800) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:25 executing program 5: [ 2442.935073] audit: type=1400 audit(1575075419.554:386): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:26 executing program 5: 00:57:26 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4602000000f87f69ae00c4b400f3883e"], 0x13) preadv(r0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f00000000c0)=""/97, 0x61}, {&(0x7f0000000240)=""/229, 0xe5}, {&(0x7f0000000340)=""/151, 0x97}, {&(0x7f0000000400)=""/248, 0xf8}, {&(0x7f0000000500)=""/180, 0xb4}, {&(0x7f00000005c0)=""/231, 0xe7}, {&(0x7f00000006c0)=""/230, 0xe6}], 0x9, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/enforce\x00', 0x40000, 0x0) accept4$unix(r1, &(0x7f00000008c0), &(0x7f0000000940)=0x6e, 0x100000) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2442.936603] audit: type=1400 audit(1575075419.564:387): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:27 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000000)={0x9, 0xf6a, 0x7ff, 0x9, 0x15, 0x1, 0xa, 0x8, 0x2}) fallocate(0xffffffffffffffff, 0x2, 0x5, 0x8000) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 00:57:26 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:26 executing program 5: 00:57:26 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') pipe(&(0x7f0000000040)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000100)) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) 00:57:27 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) [ 2443.233327] audit: type=1400 audit(1575075419.854:388): avc: denied { dac_override } for pid=1159 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:28 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) 00:57:28 executing program 3: mkdir(0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.system.Security\x00', &(0x7f00000002c0)='$.6/%cpuset]\x00', 0xd, 0x4) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@gettclass={0x28, 0x2a, 0x8, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x0, 0x10}, {0x6, 0x3}, {0xb, 0x16}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20004041}, 0x20008000) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r2 = gettid() tkill(r2, 0x10010000000032) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/bnep\x00') execveat(r3, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x1000) 00:57:28 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) [ 2443.283685] audit: type=1400 audit(1575075419.904:389): avc: denied { net_raw } for pid=1172 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:29 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nfsfs\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) fsetxattr$security_selinux(r3, &(0x7f0000000000)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:sudo_exec_t:s0\x00', 0x21, 0x2) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:29 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f450500022cc858870000000000949e4d2578"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:29 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:30 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'user.', '\x00'}) [ 2443.307535] audit: type=1400 audit(1575075419.934:390): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:30 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[], 0x3dc) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:31 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) [ 2443.339008] audit: type=1400 audit(1575075419.964:391): avc: denied { dac_override } for pid=1172 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:31 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:31 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:32 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:32 executing program 3: mkdir(0x0, 0x0) pause() r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="feeae96295e88755efc3d2131140e0c4d161b97d3038cce7cdeece613ac63fead8bf65ea395dba269959"], 0x2a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:57:32 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000040)}) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}]}, 0x38}}, 0x0) r10 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r10, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r10, r10, &(0x7f00000000c0), 0xffffffff) execveat(r10, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r11 = dup(r10) write$cgroup_type(r11, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r13 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r14 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x40) getpeername$packet(r14, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r15}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r15}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r15}, 0xc) r16 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r16, r16, &(0x7f00000002c0)=0x202, 0xdd) getpeername$packet(r16, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r17}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r17}, 0x14) setsockopt$inet_mreqn(r14, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @multicast2, r17}, 0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r12, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000002040)=ANY=[@ANYBLOB="c0020000", @ANYRES16=r13, @ANYBLOB="000128bd7000fedbdf250200000008000100", @ANYRES32, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYRES32, @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r15, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb000008000600"/128, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601000080"], 0xe}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r18 = socket(0x10, 0x3, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r22}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r22}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r19, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r22, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r22}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r23 = socket(0x10, 0x3, 0x0) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r27}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r27}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r24, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r27, @ANYBLOB="08000200e000000238489d5aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r23, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r27}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r28 = socket(0x10, 0x3, 0x0) r29 = socket$nl_route(0x10, 0x3, 0x0) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r31, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r31, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r30, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r32}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r32}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r29, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r32, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r32}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r33 = socket(0x10, 0x3, 0x0) r34 = socket$nl_route(0x10, 0x3, 0x0) r35 = socket$netlink(0x10, 0x3, 0x0) r36 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r36, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r36, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r35, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r37}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r37}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r34, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r37, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r33, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r37}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r38 = socket(0x10, 0x3, 0x0) r39 = socket$nl_route(0x10, 0x3, 0x0) r40 = socket$netlink(0x10, 0x3, 0x0) r41 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r41, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r41, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r40, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r42}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r42}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r39, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r42, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r38, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r42}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r43 = socket(0x10, 0x3, 0x0) r44 = socket$nl_route(0x10, 0x3, 0x0) r45 = socket$netlink(0x10, 0x3, 0x0) r46 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r46, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r46, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r45, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r47}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r47}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r44, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r47, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r43, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r47}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r48 = socket(0x10, 0x3, 0x0) r49 = socket$nl_route(0x10, 0x3, 0x0) r50 = socket$netlink(0x10, 0x3, 0x0) r51 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r51, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r51, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r50, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r52}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r52}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r49, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r52, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r48, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r52}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r53 = socket(0x10, 0x3, 0x0) r54 = socket$nl_route(0x10, 0x3, 0x0) r55 = socket$netlink(0x10, 0x3, 0x0) r56 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r56, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r56, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r55, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r57}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r57}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r54, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r57, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r53, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r57}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) r59 = socket(0x10, 0x3, 0x0) r60 = socket$nl_route(0x10, 0x3, 0x0) r61 = socket$netlink(0x10, 0x3, 0x0) r62 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r62, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r62, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r61, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r63}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r63}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r60, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r63, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r59, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r63}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r64 = socket(0x10, 0x3, 0x0) r65 = socket$nl_route(0x10, 0x3, 0x0) r66 = socket$netlink(0x10, 0x3, 0x0) r67 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r67, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r67, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r66, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r68}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r68}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r65, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r68, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r64, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r68}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r69 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r69, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r69, r69, &(0x7f00000000c0), 0xffffffff) execveat(r69, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r70 = dup(r69) write$cgroup_type(r70, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet_pktinfo(r70, 0x0, 0x8, &(0x7f0000003100)={0x0, @empty, @initdev}, &(0x7f0000003140)=0xc) r72 = socket(0x10, 0x3, 0x0) r73 = socket$nl_route(0x10, 0x3, 0x0) r74 = socket$netlink(0x10, 0x3, 0x0) r75 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r75, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r75, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r74, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r76}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r76}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r73, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r76, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r72, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r76}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r77 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r77, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r77, r77, &(0x7f00000000c0), 0xffffffff) execveat(r77, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r78 = dup(r77) write$cgroup_type(r78, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet_IP_XFRM_POLICY(r78, 0x0, 0x11, &(0x7f0000003240)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000003340)=0xe8) r80 = socket(0x10, 0x3, 0x0) r81 = socket$nl_route(0x10, 0x3, 0x0) r82 = socket$netlink(0x10, 0x3, 0x0) r83 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r83, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r83, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r82, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r84}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r84}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r81, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r84, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r80, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r84}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r85 = socket(0x10, 0x3, 0x0) r86 = socket$nl_route(0x10, 0x3, 0x0) r87 = socket$netlink(0x10, 0x3, 0x0) r88 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r88, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r88, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r87, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r89}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r89}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r86, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r89, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r85, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r89}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r90 = socket(0x10, 0x3, 0x0) r91 = socket$nl_route(0x10, 0x3, 0x0) r92 = socket$netlink(0x10, 0x3, 0x0) r93 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r93, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r93, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r92, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="3a02000000000000346ead0008000000a51cc7930b3a0e04000000000000ae51efd28031ca6b597ee115becfff8730a93226ce890ce93b21a6dd13c14146bb", @ANYRES32=r94, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r94], 0x38}}, 0x0) sendmsg$nl_route(r91, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r94, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r90, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r94}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r95 = socket(0x10, 0x3, 0x0) r96 = socket$nl_route(0x10, 0x3, 0x0) r97 = socket$netlink(0x10, 0x3, 0x0) r98 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r98, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r98, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r97, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r99}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r99}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r96, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="200000009400e5f0a883d8d8c85883af02af0fce", @ANYRES32=r99, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r95, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r99}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r100 = socket(0x10, 0x3, 0x0) r101 = socket$nl_route(0x10, 0x3, 0x0) r102 = socket$netlink(0x10, 0x3, 0x0) r103 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r103, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r103, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r102, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r104}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r104}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r101, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r104, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r100, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r104}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r105 = socket(0x10, 0x3, 0x0) r106 = socket$nl_route(0x10, 0x3, 0x0) r107 = socket$netlink(0x10, 0x3, 0x0) r108 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r108, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r108, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r107, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r109}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r109}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r106, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r109, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r105, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r109}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r11, &(0x7f0000004000)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000003fc0)={&(0x7f0000003380)={0xc24, r13, 0x200, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r22}, {0x84, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r32}, {0x180, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r37}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x1, 0x0, 0x3, 0x1a3}, {0x7f, 0xcd, 0x66, 0x10}, {0x6, 0x1, 0x44, 0x1ff}, {0xa8, 0x1, 0x50, 0x401}]}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x7, 0x3, 0xfffffff7}]}}}]}}, {{0x8, 0x1, r42}, {0x1ec, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8ce}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r47}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r52}}}]}}, {{0x8, 0x1, r9}, {0x10c, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x1f, 0x1, 0x61, 0x81}, {0x0, 0xff, 0x9, 0x8}, {0x3f, 0x15, 0x2, 0x5}, {0x9, 0x3, 0x5, 0x8}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r57}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r9}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r58}, {0x2d8, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x7, 0xf8, 0x1, 0xad}, {0x4, 0x8, 0x5, 0x3}, {0x4, 0x81, 0x1, 0x1}, {0x1a, 0x3, 0x8, 0x6}, {0x3, 0x7, 0x0, 0xffffffff}, {0xff7f, 0x34, 0x60, 0x8f0}, {0x73a, 0x4, 0x1, 0x3}, {0x781, 0x20, 0x0, 0x3}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x80}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r63}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x20, 0x1, 0xb1, 0x9}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x4, 0x1, 0x8, 0x4}, {0xf55a, 0xa0, 0x3, 0xf2}, {0x3, 0x0, 0x5, 0x5}, {0x1000, 0x75, 0x1, 0x3}, {0x3, 0x9, 0xb4, 0x7}, {0x200, 0x1, 0x7, 0x8}, {0x9, 0x1, 0x9, 0x3}, {0x200, 0x4, 0x48, 0x7f}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r68}}}]}}, {{0x8, 0x1, r71}, {0x4}}, {{0x8, 0x1, r76}, {0x220, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r79}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r84}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r89}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r94}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r99}, {0xd4, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x1ff, 0x6, 0x0, 0x7}, {0x4, 0xb1, 0x3f, 0x2}, {0x46, 0x3b, 0x5}]}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r104}}}]}}, {{0x8, 0x1, r109}, {0xb0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8dbe}}}]}}]}, 0xc24}, 0x1, 0x0, 0x0, 0x80}, 0x4004) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r9, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in=@broadcast, @in6=@dev={0xfe, 0x80, [], 0x15}, 0x4e23, 0xcd, 0x4e23, 0x2, 0x7, 0x0, 0x90, 0x3c, r9, r1}, {0xd0db, 0x7fffffff, 0x8, 0x0, 0x3, 0x9, 0xa387, 0x7}, {0x8, 0x8, 0x0, 0x1}, 0x5, 0x6e6bbf, 0x1, 0x0, 0x0, 0x3}, {{@in=@multicast1, 0x4d5, 0xff}, 0xa, @in=@rand_addr=0x8000, 0x3503, 0x0, 0x0, 0x3f, 0x6, 0x2, 0x3}}, 0xe8) [ 2443.699188] audit: type=1400 audit(1575075420.324:392): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:33 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:33 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 2443.766376] audit: type=1400 audit(1575075420.394:393): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2443.767892] audit: type=1400 audit(1575075420.394:394): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2444.455854] audit: type=1400 audit(1575075421.084:395): avc: denied { net_raw } for pid=1219 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:36 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r2, 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000180)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r6, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = socket(0x18, 0x803, 0x0) fstat(r12, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r7, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r9, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r10, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r11, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r14, &(0x7f0000000200)=""/250, 0x50c7e3e3) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r16 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r14, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket(0x18, 0x803, 0x0) fstat(r20, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r15, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r17, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r18, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r19, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r21, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r22, &(0x7f0000000200)=""/250, 0x50c7e3e3) r23 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r24 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r24, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r22, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket(0x18, 0x803, 0x0) fstat(r28, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r30 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r30, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r30, r30, &(0x7f00000000c0), 0xffffffff) execveat(r30, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r31 = dup(r30) write$cgroup_type(r31, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r32 = gettid() tkill(r32, 0x10010000000032) fsetxattr$system_posix_acl(r23, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r31, @ANYRESDEC=r0, @ANYBLOB="17ea25de90e6107881bc65", @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYPTR, @ANYPTR64, @ANYPTR64], @ANYRES16, @ANYBLOB="d9d04b6050c2b4f89f426f363f1396492b6eeb092c5a448e8db10f8340b1532c97cfacb84db5198b85c66c26c98b3c1233a5b859f541535c40503d7da17558fc5d6b58ef805c0bd0454ff5cc84e4adcc9f244932ee69baf86d6dadf9c7743fe47e36283fde06b518cdf26b0c22f100c8454b8d18aa1f566ad0c7be895ee53078c0ad8d92b295106c92c20792d7133c5b89ed510ee2", @ANYRES64=r32], @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r25, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r26, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r27, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYRES16=r9, @ANYRES32=r29, @ANYRES32, @ANYRES32], 0x18, 0x3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r33, &(0x7f0000000200)=""/250, 0x50c7e3e3) r34 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r35 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r35, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r33, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r39 = socket(0x18, 0x803, 0x0) fstat(r39, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r34, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r36, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r37, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r38, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r40, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) getgroups(0x5, &(0x7f0000000280)=[r21, 0xffffffffffffffff, r29, r38, 0xee01]) r42 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, r42) lstat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r42, 0x0, r43) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r44, &(0x7f0000000200)=""/250, 0x50c7e3e3) r45 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r46 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r46, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r44, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r50 = socket(0x18, 0x803, 0x0) fstat(r50, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r45, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r47, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r48, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r49, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r51, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r53, &(0x7f0000000200)=""/250, 0x50c7e3e3) r54 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r55 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r55, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r53, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x18, 0x803, 0x0) r59 = socket$packet(0x11, 0x2, 0x300) fstat(r59, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r54, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r56, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r57, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r58, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r60, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010004000000000002000600", @ANYRES32=r2, @ANYBLOB="040000000000000008000000", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r5, @ANYBLOB='\b\x00\f\x00', @ANYRES32=r13, @ANYBLOB="08000400", @ANYRES32=r41, @ANYBLOB="08000500", @ANYRES32=r43, @ANYBLOB="08000200", @ANYRES32=r49, @ANYBLOB="08000300", @ANYRES32=r52, @ANYBLOB="08000200", @ANYRES32=r58, @ANYBLOB="860d0400", @ANYRES32=r61, @ANYBLOB="10000000000000002000040000000000"], 0x7c, 0x0) 00:57:36 executing program 5: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r2) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0xffff, 0x4, 0x7}) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:36 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:36 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46023ebe0f484ca53d880bff1003ebeaa3abb92e633ddd7113b9693f6483bd92d22ff49be8b95b52fae4a5025c7f59b5da2f88784736f17d5cc4e932ba06679eef8da15f57a757baaef24372742f93627a41f0ec"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2448.006593] audit_printk_skb: 72 callbacks suppressed 00:57:37 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r0) fstat(r0, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) [ 2448.006605] audit: type=1400 audit(1575075424.634:420): avc: denied { dac_override } for pid=1330 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:37 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:38 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) r2 = dup2(r1, r0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0x40, 0x8}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x800) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)={0x6, 0x800, 0x1}) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:38 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:38 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = dup(r6) write$cgroup_type(r7, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r8, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r8, r8, &(0x7f00000000c0), 0xffffffff) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r8) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r11 = gettid() tkill(r11, 0x10010000000032) r12 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r12, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r12, r12, &(0x7f00000000c0), 0xffffffff) execveat(r12, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r12) r13 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r13, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r13, r13, &(0x7f00000000c0), 0xffffffff) execveat(r13, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r14 = dup(r13) write$cgroup_type(r14, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYRESOCT, @ANYRESDEC=r4, @ANYRESHEX=r7, @ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR64, @ANYRESDEC, @ANYRES64=r8, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR, @ANYRES16, @ANYRESOCT, @ANYRESDEC, @ANYPTR64, @ANYRES64], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR, @ANYRES16=0x0, @ANYRESHEX=r10, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESHEX=r2, @ANYRES32=r3, @ANYPTR64]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=r5, @ANYRES16=r12, @ANYRES16, @ANYRES64, @ANYBLOB="e22fc76c4ecaacaa1a04421474048e6440c7f21cc32f4d6fdd097efdfad30ad1364a2eed00dc633438581ad546e5aaa5907ed4fd130e71f7a05015f8847bae97ff2e8712e4a364202852306edee1eb2599a52e7e8352a87e37af11e2c5a0c0c3d0ed93b2eefc4904522bc29bbf3c6f9b247c871b02a1fb4ff14d51f0efda68244e629656b83e16b63148421e8eb2d63da60e287341869dd1c9f68230a98e154b9c19fbe4da91619bacb97004e5fbc087852f50a671daa432", @ANYBLOB="a43f811d16192166b8d362d8eb513c61ab514d29d2534a512380bc73cebae2630788aa720f1df1a13d2b57c50e378afdc27b5016fc465a339f34e81ed1727cc3538a5f09e14c7fac7c9db5da7d5a599049f4963447dcd141e7b40dfaa3021f9187b6ecbca2a05fc1d55fc6a67f96d365fbc15c911092896a87f20e5d93edf5f84b876a6d", @ANYBLOB="c5b88212a8994abe72ea09992e26852f5a282dd127455276127816ddba358de515a755cc18f399b4f64006f0ba93f6a86abcbe6814d5f87d243ad6aeca59154fc4e0e47569fe64bfa2c1d27cf121549bc28c7da939e7860fdb1f9ea06ca303861a977dfc3ded4d5970f53dce89260bad355918473ec1ff5a"], @ANYRES64, @ANYRES64=r2, @ANYRES64=r14, @ANYBLOB="75cfb7ebfe856e3bb7e0823b887be830e56c270357fcb398104601e5055a724abfb80ac09d4019f522e6f9044878520d7bd8c98ab13e6276e2600b2eabda76b6c2d6099d7b9b212e0aeb4cb0f07acc8dc7be29b7e8720e3ba16d2e1c35b8dbf7978d58d80355f8fa274a6d1e0021033a144ffec74b5a50"], 0xf0) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r15 = dup(r3) write$cgroup_type(r15, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r16 = fcntl$dupfd(r2, 0x80c, r15) ioctl$RTC_AIE_ON(r16, 0x7001) [ 2448.016872] audit: type=1400 audit(1575075424.644:421): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:38 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:39 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2448.018525] audit: type=1400 audit(1575075424.644:422): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:39 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x25d) 00:57:40 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') syz_open_dev$char_usb(0xc, 0xb4, 0x2) exit(0x0) times(&(0x7f0000000000)) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/54, 0x36}, {&(0x7f00000000c0)=""/54, 0x36}, {&(0x7f0000000100)=""/70, 0x46}, {&(0x7f00000002c0)=""/85, 0x55}], 0x4, 0x80) 00:57:40 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:40 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="0000f3dfffff"], 0x13) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001600)={0x5, 0x8000, 0x0, 0x101, 0x9, 0x31aa}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) pipe(&(0x7f0000000000)) syz_open_dev$loop(0x0, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)) ftruncate(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket(0x200000100000011, 0x2, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2b) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f00000013c0)='TRUE', 0x4, 0x3) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r2) sendfile(r4, r5, 0x0, 0x80000001) dup(0xffffffffffffffff) [ 2448.245803] audit: type=1400 audit(1575075424.874:423): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:41 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') listen(r0, 0x1f) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:41 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/191, 0xfedd}], 0x0, 0x8) 00:57:41 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2448.348101] audit: type=1400 audit(1575075424.974:424): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:42 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:57:42 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:43 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2448.676648] audit: type=1400 audit(1575075425.304:425): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:43 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000040)=""/63, 0x3f}, {&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000180)=""/70, 0x46}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/197, 0xc5}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/184, 0xb8}], 0x7, 0x1) 00:57:43 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454446020000000000cf0010c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)='bcsh0\x00') 00:57:43 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000000)={{0x1, 0x0, @identifier="0585edf63145b90548fc835e97552bd1"}}) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x800) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000fdbff8)=[{&(0x7f00000025c0)="290000002100190000003fffffffda260200000000e80001040000040d00140000000000132eb75c35", 0x40d}], 0x1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r3, 0xc, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xd, 0x8001, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r0) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCSSERIAL(r4, 0x541f, &(0x7f0000000100)={0x9, 0x40, 0x400, 0x0, 0xff, 0xa68b, 0x9, 0xfffffffa, 0x6, 0x7f, 0x6f, 0xfffffeac, 0x4, 0x2, &(0x7f0000000080)=""/73, 0x401, 0x65e, 0x3}) 00:57:44 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e22, 0x3, @mcast1, 0x100}}, 0x0, 0x4, 0x0, "4f945bec8aa2a8b52af2958aad1978896c6ceb183c816cc4a5f845a739c37191140ae0d4e7d537ae2acfc4a3ae2960edf3a614ccf8eec997faa8be61fe0e8d64b704ea6e5e00698174dcd41309b5173e"}, 0xd8) r6 = openat$cgroup_int(r3, &(0x7f0000000640)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendfile(r6, r1, &(0x7f0000000680)=0x4, 0x8) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:44 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:57:44 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:44 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r3, 0xfffffff8, 0x18}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={r3, 0x1d7, 0x4}, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f00000005c0)={0x7f, 0x1, 0x5, 0x1000, 0x3}) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x288, 0x0, 0xe0, 0xe0, 0x0, 0xe0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, &(0x7f0000000100), {[{{@uncond, 0x0, 0x98, 0xe0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x6, 0x4, 0x5, 'snmp_trap\x00', 0xfff}}}, {{@uncond, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x600, 0x100}}, @common=@inet=@tcpmss={0x28, 'tcpmss\x00', 0x0, {0x1, 0xc0ea}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000004c0)=[@mss, @sack_perm, @sack_perm, @mss={0x2, 0x1}, @mss={0x2, 0x6}, @window={0x3, 0x4, 0x8000}, @timestamp, @mss={0x2, 0xfffffffa}, @mss={0x2, 0x1}], 0x9) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) syslog(0x9, &(0x7f0000000a00)=""/4096, 0x1000) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$sock_inet_SIOCGIFADDR(r6, 0x8915, &(0x7f0000000480)={'veth1_to_bond\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 2448.693206] audit: type=1400 audit(1575075425.314:426): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:45 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', r2}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r3, &(0x7f0000000040)=""/253, 0xfd) r4 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="010a04b30000000027a83ca0a772d65bf2a4073921c74ec01d8d61c617e1a4ed8bf6b5c8266198b3a61b730915b4fd83416a589a063ef31a50c793c1945f27529ed3510d976b99c02727c1455b45fe9dfbbe099a83d92de5cb28524de7592d0d88d7b72b747f93c66677b6eba6213d8ec01628e07bb7253d87cbba4a3358accf96f0aa391208ce915ff9bd7c5df641fd10de0aa01cb6af8c9cda994eb8c8c2211ced1d37a07f91945263a8f7acc759616d7bf392e31a796891188bd6c8d62395947964c246b6afb8c41b3c82ebfcb02908f4b924c4e1f3d1235328b1830258a85cdeb1e3", @ANYRES16=r5], 0x2}, 0x1, 0x0, 0x0, 0x30000000}, 0x801) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x42400000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="20010000", @ANYRES16=r5, @ANYBLOB="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"], 0x120}}, 0x1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xa4, r5, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x10}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10000084}, 0x0) 00:57:45 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 00:57:45 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x800) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:45 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getpeername$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r6 = socket(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r10}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r10, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r11 = socket(0x10, 0x3, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38c70aeb49793783f3c340001000006f000000000000000000404200000000000000", @ANYRES32=r15, @ANYBLOB="00000000000000001800120008010000007469000c00020008004400", @ANYRES32=r15], 0x38}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r15, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r15}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r16 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r16, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r16, r16, &(0x7f00000000c0), 0xffffffff) execveat(r16, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r17 = dup(r16) write$cgroup_type(r17, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r17, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}}}, &(0x7f0000000580)=0xfffffffffffffddd) r19 = socket(0x10, 0x3, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r20, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r22, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r19, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r22}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r23 = socket(0x10, 0x3, 0x0) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001380)=@newlink={0x24, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r27}, [@IFLA_IFALIASn={0xffffffffffffff77}]}, 0x24}}, 0x4000000) sendmsg$nl_route(r24, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r27, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd99869b9c1ec835e4f184a"], 0x3}, 0x1, 0x0, 0x0, 0x8008}, 0x0) sendmsg$nl_route(r23, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r27}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r28 = socket(0x10, 0x3, 0x0) r29 = socket$nl_route(0x10, 0x3, 0x0) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r31, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x40020) getsockname$packet(r31, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x699) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) sendmsg$nl_route(r30, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001480)=@bridge_setlink={0x0, 0x13, 0x20, 0x70bd2c, 0x25dfdbfc, {0x7, 0x0, 0x0, 0x0, 0x4108, 0x20}, [@IFLA_OPERSTATE={0x0, 0x10, 0x1}, @IFLA_AF_SPEC={0x0, 0x1a, [{0x0, 0x16}, {0x0, 0x1c}]}, @IFLA_TXQLEN={0x0, 0xd, 0x85a}, @IFLA_PHYS_PORT_ID={0x0, 0x22, "bf4f48f658fc1d0a8eb0cd741a5ccb7af82b"}]}, 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x4040000) sendmsg$nl_route(r29, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r32, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) r33 = socket(0x10, 0x3, 0x0) r34 = socket$nl_route(0x10, 0x3, 0x0) r35 = socket$netlink(0x10, 0x3, 0x0) r36 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r36, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r36, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r38 = socket(0x10, 0x3, 0x0) r39 = socket$nl_route(0x10, 0x3, 0x0) r40 = socket$netlink(0x10, 0x3, 0x0) r41 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r41, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r40, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r39, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r38, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$nl_route(r35, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001740)=@ipv6_delroute={0x210, 0x19, 0x400, 0x70bd2a, 0x25dfdbfc, {0xa, 0x94, 0x0, 0x0, 0xfd, 0x4, 0x0, 0x1, 0x1000}, [@RTA_ENCAP={0x9c, 0x16, @generic="b670866dd07dbbce85424a9594680262f0538a8bb42a7ff89f459c5ca5da12682c932135141d130f36237cc19bf77d71531d74e3430b4611bcb1fb1744706eb48e2cc85a7eb389c3b6c70a700eb640292b5be2047e285216b5e9f645a47fd8aed97f45c4227ba368f84828de1a918b231e4e394180571188e654f027d4c09c05e8af2637b1262fc3a721023bb8b140ba111b53a161"}, @RTA_ENCAP={0x148, 0x16, @nested={0x144, 0x8c, [@generic="87b66aed21d7e1d82448075ab36cac7ff8f8d6c5191b1efb05b0c221ff6e1cb4496c20c2ee28bfe8dbf6d5cb5ce2fed5ca1ea1b95588471a8981dc0e54ab8424aea4349fd5d5d026da9ef94e97cba42d47b8166001cb4200ed7190c2", @generic="d57eff5058f3276bb64c447d6ba7709ca7f06b69317be350ad63cddbe4f6e6f093db23d173ffedee7f97931526984db8b8932de97dd87207d6c0c5820215779a6fd3c77e128bd764dfe7badc5647d2cf6878c074fa040aa6432dbe1766469ee92990917c3a01005b4aabe4cd3f30ae55a6f382ce64e859e0cbaf58e2f919b0059feb991b27223cea5f652a82464d78b82e71ad6cb92a3729d0c84f0cbc5cf8184ce147854f4279594b7a5610c6de7d968eb37bff182eeb33b4d483b825683dba6bcf40ee2fc23626adabd225dc7ecae815df152a7329ea838c4661a216a3940e91"]}}, @RTA_IIF={0x8}, @RTA_EXPIRES={0x8, 0x17, 0x6}]}, 0x210}}, 0x0) sendmsg$nl_route(r34, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001140)=ANY=[@ANYBLOB="20000000140001000000000000000000020000001a460999a9dba4eb1d666d2f851b1ab84493a91cbab37f39f35ce77ca1cbc318c8958af1bea29400db8bd072554a53ac12c71071d5776882f04b63104aac2d11d7cc8b97fc32b48be059b526ee4b03318ae75e62a61dc938e769dc01cb1a0cf96dd14def052976a0ea36f2fcfa360537f9860d6148bbd7f05c82aae70b91ed9abced5bd52e44bbc06fd492a73342b5ed6c229654c066307d589d", @ANYRES32=r37, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r33, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r37}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$nl_route(r28, &(0x7f0000000240)={0x0, 0xfffffffffffffdcf, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x25dfdbfd, {0x2, 0x0, 0x300, 0x0, r37}}, 0x20}}, 0x0) r42 = socket(0x10, 0x3, 0x0) r43 = socket$nl_route(0x10, 0x3, 0x0) r44 = socket$netlink(0x10, 0x3, 0x0) r45 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r45, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r45, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r44, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r46}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r46}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r43, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r46, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r42, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r46}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000600)={0x0, @vsock={0x28, 0x0, 0xffffd8ef, @reserved}, @isdn={0x22, 0x23, 0x9, 0xcc, 0x5}, @xdp={0x2c, 0x0, r46, 0xc}, 0x3c6, 0x0, 0x0, 0x0, 0xffff, &(0x7f00000005c0)='netdevsim0\x00', 0xa30, 0x0, 0x81}) r48 = socket(0x10, 0x3, 0x0) r49 = socket$nl_route(0x10, 0x3, 0x0) r50 = socket$netlink(0x10, 0x3, 0x0) r51 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r51, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r51, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r50, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r52}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r52}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r49, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001500)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r52, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a663fe49ae240a36c6a8ef562f94ae644091b2c7774c284bf89dc9ea819994cfac6a51be01a09f9d681a0b355a03c6c7dc109adc0c2db37a0a5bb785e93431f6fb33576e14d0e7bc455b722493c009c504dcd17458a4ace43b628a7341ed9ebb9b58b2782886c98e08c15a510ce52b455277f672af76f9ca2d9f624f44e136aaf0d5bf2f719cae1e060708b4576830d611583399afd170b"], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$nl_route(r48, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r52}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r53 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r53, &(0x7f0000001980)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257227501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd0cbbd94e3aedd56ddb8ffdeaa2a21049f48e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c217022b620b709f8b561254c752bb97cab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb053efbf94c0d62167bdac770f602"], 0x3c) sendfile(r53, r53, &(0x7f00000000c0), 0xffffffff) execveat(r53, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r54 = dup(r53) write$cgroup_type(r54, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet6_mreq(r54, 0x29, 0x1c, &(0x7f0000000980)={@mcast2, 0x0}, &(0x7f00000009c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000010c0)={&(0x7f0000000a00)={0x69c, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r5}, {0xf0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4e6b}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r18}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8, 0x1, r22}, {0xb0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xaaa0dbd1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x1dc, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r27}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r32}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8, 0x1, r47}, {0x1ec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r52}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r55}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xd1a}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x7, 0x0, 0x1f, 0x4800000}, {0x3, 0x1, 0x59, 0x2}, {0x100, 0x2, 0xff, 0xe0}, {0x3f, 0xf9, 0xfc, 0x80000001}]}}}]}}]}, 0x69c}}, 0x81) 00:57:46 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = gettid() tkill(r1, 0x10010000000032) sched_setparam(r1, &(0x7f0000000040)=0x3) 00:57:46 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:57:46 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2449.226731] audit: type=1400 audit(1575075425.854:427): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:46 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x5c, 0x0, &(0x7f0000000200)=[@clear_death, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000016c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r6, &(0x7f0000000500), 0x37d, 0x0) 00:57:46 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/B~pus\x06\x00\x00\x00', 0x4752226c5961ab57) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c660f0000000000000001c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000080)=ANY=[@ANYBLOB="0400ba0094d05d5c2ede5789803dfa5183abc0ddb23ee42416a576ba9b47ac1d32bceb2b59796b0d1eb22eaa88149291fa967f2550735aec91053717afff1ca622edc3956133847403e9e57768866469869a7c7a096bad4b05a52a914dba5a3e946baf582b2d2936d0935573e80ec3335f4c9fa7007684aa0a5a218d7387aad858f6a0eb29a6f251ebc3c20687c01287e11d64fab652c610fe3a41af034ac41a3059fc02fae925f871a24706840f290a57419f8ad40176e4ffeb59e21596"]) 00:57:46 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4602000000b40003003e000000000000"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:46 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x119) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0xe2800, 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7fff0f00000000000000000000c4b40003003e"], 0x13) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) execveat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x100) 00:57:47 executing program 0: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x7f}, 0x10) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r2, &(0x7f00000016c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:57:47 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\x10', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2449.238984] audit: type=1400 audit(1575075425.864:428): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2449.239338] audit: type=1400 audit(1575075425.864:429): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:49 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:57:49 executing program 1: r0 = memfd_create(&(0x7f0000000180)='$.6/%cpuset]\x00\xde\xcd\b\xdd\xae\xf9\v)\xabR\x06\xc4\xbd\xd2~\x98\x90\xf8\xbd\x04\tI\xdbsmp\xf0\xcb\xd5\xdbd\x94\xfd\x8e\x946\x82J\x933\xb8\xdc\xdc\x92\xa6Qa\xdf\xdc\xe9P`\xaa.L\xf0\x1bd\xbf\x9a|\xc18\xfd\xb5\xb4f\xce2I\xa4\xbez\xb7\xfc\x99\xbf\x89\x9a\xe0fz9\xd7\xfb\x8c.\xa0\xedZ\xeai\x1b;A\xb3\x14=\xc5F\x7f\x04\x17\xd7y\x8d\x9a3\x95m|\x91V\t2\xa5\x181v\xa8\xe52\xd4\xb9\xce\xbd0\xfa\xf0\x8b\x93\x8b\x91h\xc3\xf7\x91\xcev\xc3\x00'/169, 0x6) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000540)='\x00\x00\x00!\x00', 0x9) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000100)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCEXCL(r4, 0x540c) 00:57:49 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2453.172107] audit_printk_skb: 66 callbacks suppressed [ 2453.172115] audit: type=1400 audit(1575075429.794:452): avc: denied { sys_admin } for pid=2061 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:50 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockname$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0) 00:57:51 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:51 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a5e860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r2 = accept4$inet6(r1, 0x0, &(0x7f0000000040), 0x80000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r3, &(0x7f00000016c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r4, &(0x7f0000000500), 0x37d, 0x0) [ 2453.173868] audit: type=1400 audit(1575075429.794:453): avc: denied { net_admin } for pid=2061 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:51 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:57:51 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) r4 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x280000) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f0000000440)={0x10001, {{0x2, 0x4e24, @multicast2}}}, 0x88) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x1d4, 0x0, 0x2, 0xe96a8664f7737cfe, 0x70bd27, 0x25dfdbff, {}, [@nested={0x1c0, 0x71, [@generic="69c4427489fc338f26c57ccfd5fc8e612d0d6c8ef34efa774e645fe53fd5d54b17b9b426ff6caca130d5935bebd29155b600af4ab703ce4528bcdaae31", @generic="da482c1582d515479d7b62ab868d3388ae854288748d618ebce3055546f50dad8730d2810bf03416e1c95b0377502b1d355868c29c35694fb15d7422366789af979eb9c48249a9929ab001fdc26e817d176e8347e7856623", @generic="13f7b98923cfc859b2a488a4d0e4757cdad042489341c8f00dbb6c64c100e5d78b4f4681d498c91f79a9ec417f6914e07c24558e711d710ddd80", @generic="bca76eaf583e781844df9a80453e6163416bf6e90e14fdbc92970f96edaeefae34f6c1b205d69aed64fecf8fd9a8b3fedc2fe50089293626e04c20b0f3e08e88c3d85990889ce8675317514d36702a96a0204a2be30d98aba3c2f4d2fbe32178be4c54f0329eaa2cd21685868101f8fbe33753c6d5d485d05601b7fba413ca5bee3456cb3f05f5bf100b61ce5d4785a2d09ac1dfcb2df67a533a", @generic="8b85d759927af129656f95ee35231ccf87c291a47d68a7840207c3a75e3c6532ddc8e12747c3a82859e22d491a6b48f9d5ba440e2f9ea59b9242c0615c97", @typed={0x14, 0x26, @str='$.6/%cpuset]\x00'}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x1c801}, 0x4048013) r5 = dup(r1) write$cgroup_type(r5, &(0x7f0000000080)='\xf5\x05\x00\x00\x00\xff\xff\"\x00', 0xfffffffffffffec9) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000180)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2453.180028] audit: type=1400 audit(1575075429.804:454): avc: denied { net_raw } for pid=1541 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:52 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) fstat(r0, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt(r3, 0x843, 0x4f53, &(0x7f0000000180)="4abaa7dcc27a837ca3ed3d1cc64aa8d2d68072c3f473a490b7a6b44dc9871f54a33d59c8a48a03809fecd7f07d0409fcb0bc6c12b951db04b851cf1893f5d1d16bf1ae668c14ea2560bc0e0ec1319b8eb1ffc10dc9f6663eeeafa3d60c211c64a97a7ba0ef2073883b1e53b15b1962b5eac2c419355c05", 0x77) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) 00:57:53 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:57:52 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2453.260492] audit: type=1400 audit(1575075429.884:455): avc: denied { dac_override } for pid=1541 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:54 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:57:54 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80, 0x20) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0x12) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) execveat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:54 executing program 5: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) [ 2453.578591] audit: type=1400 audit(1575075430.204:456): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:55 executing program 2: socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:57:55 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = creat(&(0x7f0000000040)='./file0\x00', 0x30) fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r3) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[], 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r2) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r4, 0x28, &(0x7f00000000c0)}, 0x10) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) 00:57:55 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x10000) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="03003e00"/19], 0x13) r2 = memfd_create(&(0x7f0000000300)='$ 6\xd3u8\x85\xb2\xe0K\x84\xad\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) r3 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r2) fallocate(r2, 0x44, 0x5, 0x3) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r5 = accept4(r4, &(0x7f0000000280)=@x25, &(0x7f0000000080)=0x80, 0x800) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='veth0\x00', 0x10) [ 2453.580717] audit: type=1400 audit(1575075430.204:457): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:57 executing program 2: socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2454.068333] audit: type=1400 audit(1575075430.694:458): avc: denied { dac_override } for pid=1571 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:58 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000008000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:57 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2454.074359] audit: type=1400 audit(1575075430.694:459): avc: denied { net_admin } for pid=1571 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:57:59 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c46020000000000000000000000000000ea4e12ce34e27888faabe69d40cf6b60e0fc042810fb84b8e7a2f9d8045ddd88f29d255379efb197e989a6669a9235fe7a6146ec6f110ec94eb9228d940be1ca52e8ecfd6821a916285c4b9830c0a9d29d7dd87f2c755f61dcadb68ea423db40bcbe06256ed48ce02739c99f891a4c23c191a739556b95a9175b274a7f57ac2ef659946e54e99304a0ee9d5fec3761ed689fd0e81b578b6857177b6630dde20c71665d76670d6f0482dc68615ab33729d7477aabaa7d6354640cc2c3758e51"], 0x13) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="20003f0000002c9d1d26d4772a000000000004", @ANYRES32=r5, @ANYBLOB="08000200e000000238489d4aff2c2461bf2469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a00000000"], 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', r5}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x756c96966bd4063b}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r7, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x800) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)={@broadcast, @local, r6}, 0xc) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r8, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r8, r8, &(0x7f00000000c0), 0xffffffff) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r9 = dup(r8) write$cgroup_type(r9, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x0, &(0x7f0000000600)=0x4, 0x4) pipe(&(0x7f00000000c0)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:57:59 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r6 = gettid() tkill(r6, 0x10010000000032) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r7, r7, &(0x7f00000000c0), 0xffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r7) r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r8, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r8, r8, &(0x7f00000000c0), 0xffffffff) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r9 = dup(r8) write$cgroup_type(r9, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r10 = gettid() tkill(r10, 0x10010000000032) r11 = gettid() tkill(r11, 0x10010000000032) r12 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r12, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r12, r12, &(0x7f00000000c0), 0xffffffff) execveat(r12, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r12) r13 = gettid() tkill(r13, 0x10010000000032) r14 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r14, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r14, r14, &(0x7f00000000c0), 0xffffffff) execveat(r14, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r15 = dup(r14) write$cgroup_type(r15, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r16 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r16, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r16, r16, &(0x7f00000000c0), 0xffffffff) execveat(r16, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r17 = dup(r16) write$cgroup_type(r17, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r18 = gettid() tkill(r18, 0x10010000000032) r19 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r19, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r19, r19, &(0x7f00000000c0), 0xffffffff) execveat(r19, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r20 = dup(r19) write$cgroup_type(r20, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r21 = gettid() tkill(r21, 0x10010000000032) r22 = gettid() tkill(r22, 0x10010000000032) r23 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r23, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r23, r23, &(0x7f00000000c0), 0xffffffff) execveat(r23, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r23) r24 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r24, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r24, r24, &(0x7f00000000c0), 0xffffffff) execveat(r24, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r24) r25 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r25, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r25, r25, &(0x7f00000000c0), 0xffffffff) execveat(r25, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r25) r26 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r26, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r26, r26, &(0x7f00000000c0), 0xffffffff) execveat(r26, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r27 = dup(r26) write$cgroup_type(r27, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r28 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r28, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r28, r28, &(0x7f00000000c0), 0xffffffff) execveat(r28, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r28) write$binfmt_elf64(r3, &(0x7f0000000b80)=ANY=[@ANYRESOCT=r5, @ANYRES32=r6, @ANYRESHEX=r1, @ANYBLOB="c68d4961237a43eb8a3afee923b550a2360c278eab9b870b0355082c2edf6794429698f0752a6162895f6da310bf266b4beb82e749abf46047232e23e48ead11e35678365519887c644e3bc14086f9b56f208c36dd8e533581bcf32fe2207677df8e1dc2f96eab79793448826cef0e5ed070c222a87b0679bdef", @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESHEX=r5, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES64=0x0, @ANYPTR, @ANYRES16, @ANYPTR, @ANYPTR64=&(0x7f0000000d80)=ANY=[@ANYRES64, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYPTR, @ANYBLOB="5fae0a6424e39263bb6b9ec1fc08bb9c9facf00080571aa261f614ec015fdc0a7466e91fbedc8ddc06baf58d8dfd372a3bd6522002d236f01246ffecc60f993b6944f6d45eef89122b03360281f7fc4918fe4e2fc24b4c28fa16c2a30b98380686ffd915765d3265874688cf22c7a9f521eac7b218202158a9e7203e01b5b99a6bcf4b9ac17581e2a04ddd664088f8f296789d305ee419c3869825381abe7e3c71ce24dc747b8ac4ed127aa47b232104b3a864b60a6536f8db1e3b61ab77a9dcf0a10a793968", @ANYPTR64, @ANYRESHEX=r25], @ANYBLOB="5acd434ddbda9be80c10daae514d3a28b16b73aacfe09738614760b4af90b4058a7109580225d0bac67ee1b7ac1b15feed1fec811e83b28caa86bcc9b41b897053aa2f599b201d01b039856d0e5119df790acd2315bacf09cd3dc70150984705f1f1d8b04e50ca783c114f02d45feb0069281a5be903d5dd968c6058a83dacc008a68a31d2c5893e8d7b5576216c52842e02ab21ff5e1459d7ec1bcb72f6e027ab7a5595a78cd4b83d0d73cc30493e27126a2d9dd7a082c2e3b884d869b74f25d951c028426eaf18fb1813c25d9b5a6b8343bda8eab772", @ANYRESDEC=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESDEC=r28], @ANYRES32=r3], @ANYRES64, @ANYRES64], @ANYRES64, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000c80)=ANY=[@ANYRES32=r15, @ANYBLOB="e3568f5dad0e8191bd19c1f65bad4a8752602aaf7b5b1e246f06da6aa20adaba2dcacdb0993b8e9dc139cf78731119dad71218400348e0cd5342f7e6aad333f080d769f6bf887b8b70a6bd93275aa10374a4743f58e7d6cfb49bd94dd7ab0d5b5c9789a5512685c843c5a577dddb484382ec7d56d42eb5fe1b02618dd27be2c554ed8d0749897d125a98641cb4e48ce0b2c28185fd2d7e8bf23761c23fbfb8408ed62191a5ccef38373f5126990a18f0a85e8fd7f77f6a49c6ad6149eec286b876a86cb0c81331922ec8b023a580291f89774fa1e96d6cfe5861517132da97543f1b565b14362804d4565154", @ANYRES32=r25], @ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESDEC=r3, @ANYRES32=r6, @ANYRES32=r24, @ANYPTR, @ANYRESHEX=r9, @ANYRESOCT, @ANYPTR, @ANYRES64=r10]], @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYRES64=r11, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRES16=r3], @ANYBLOB="6c38b9ca674d81369710311ef0d520d15137a5cc8bfcb77bd9eef7c9f8a38b6a1542b549c8bbb7b75e4c23fe320c1255e373f2c70ea97e9873c1d1ccb179bcc7dacf7e1a9ba99eae2a", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYRES16=r12, @ANYRES16=r13, @ANYRESHEX, @ANYRESOCT, @ANYRESDEC=r15, @ANYRES32, @ANYRES64=r5, @ANYPTR, @ANYRESDEC=r17], @ANYPTR=&(0x7f0000000740)=ANY=[], @ANYRES32=r18, @ANYPTR64, @ANYRESOCT], @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRES64, @ANYBLOB="f897f3415f36f45e6bfb3c67f79cf52eba34ed36fa2891b2d21801000000a784f7ed56c84931edc4958a9650f65171d9ae09d6f044fdb86cfd360a2a650854cd7f6cbf1861fe7592", @ANYRES16=0x0, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32=r20, @ANYRESHEX=0x0]], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYRESHEX=r22, @ANYPTR64=&(0x7f0000000b00)=ANY=[@ANYRES32, @ANYPTR, @ANYRESHEX=r23, @ANYRESHEX=r3]]], 0xd7) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r29 = dup(r3) write$cgroup_type(r29, &(0x7f0000000080)='threaded\x00', 0xfffffffffffffe58) read$char_usb(r29, &(0x7f0000000480)=""/146, 0x92) r30 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r30, &(0x7f0000000500), 0x37d, 0x0) 00:57:59 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2454.075827] audit: type=1400 audit(1575075430.704:460): avc: denied { net_raw } for pid=1571 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:00 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="0000f3dfffff"], 0x13) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001600)={0x5, 0x8000, 0x0, 0x101, 0x9, 0x31aa}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) pipe(&(0x7f0000000000)) syz_open_dev$loop(0x0, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)) ftruncate(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket(0x200000100000011, 0x2, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2b) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f00000013c0)='TRUE', 0x4, 0x3) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r2) sendfile(r4, r5, 0x0, 0x80000001) dup(0xffffffffffffffff) 00:58:00 executing program 2: socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:58:01 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000040)=@v2={0x2, @aes256, 0x6, [], "86c299a9fb203f1daffb2ec01f05ce1e"}) [ 2454.086444] audit: type=1400 audit(1575075430.714:461): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:02 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2458.182559] audit_printk_skb: 69 callbacks suppressed [ 2458.182567] audit: type=1400 audit(1575075434.804:485): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:03 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2458.188064] audit: type=1400 audit(1575075434.814:486): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:04 executing program 5: socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:58:04 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:04 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4602000000000000003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(0x0, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) fcntl$setstatus(r2, 0x4, 0x44800) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r4) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r7, r7, &(0x7f00000000c0), 0xffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = dup(r7) write$cgroup_type(r8, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r11 = dup(r1) r12 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r12, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r12, r12, &(0x7f00000000c0), 0xffffffff) execveat(r12, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r13 = dup(r12) write$cgroup_type(r13, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r14 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r14, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r14, r14, &(0x7f00000000c0), 0xffffffff) execveat(r14, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r15 = dup(r14) write$cgroup_type(r15, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r16 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r16, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r16, r16, &(0x7f00000000c0), 0xffffffff) execveat(r16, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r16) r17 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/policy\x00', 0x0, 0x0) r18 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000800)='cgroup.subtree_control\x00', 0x2, 0x0) r19 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r19, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r19, r19, &(0x7f00000000c0), 0xffffffff) execveat(r19, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r20 = dup(r19) write$cgroup_type(r20, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) io_submit(r3, 0xa, &(0x7f0000001a00)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0xd606a59324999213, 0x1, r1, &(0x7f0000000040)="031e758839755e3da1388581afec33145b3c62e053fb91d2ee35fa92e08238591ad32e6d76b5fc657339685410cd592c16c6ae263b9f4ad8a3aa50e618a8d3e3b621e97a922e58435164fa301cde3a4a62b117ac0d45b1bd1e013b5d6c9592de5e69fa728bb7405250b6101c6de13e78568fe320785c004964f3adc2a41500f08c6d60058729ca7d3bdf51d87e7a015950019da06a0fee03b064dddc155827d4a2019630a9d8508fa67e49ffef2ceaf4438f9b65874bde30ae81f4aded3b5169", 0xc0, 0x1}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x13901ab5182f8e36, 0x4, r4, &(0x7f0000000180)="7e770dec81b088b9beb67b14a0e3133102c894a9a5db7d7c3473f593cb9e1423d37db0eb6e109e0ebc89f7e872017e8f8b4c41bd434b7777a4080ff221b3ff4ee49eef4debbd4af1f3cc7b5284bc0605e7234b302a9c8e66a70f34c6f559c4245eaca9ed734f0357e9e4868c083714db5a79c1f573e13a31600d6be6f0568a1f2ab48749fe305e2889bafb938497", 0x8e, 0x4, 0x0, 0x1, r6}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x40, r8, &(0x7f0000000280)="2bd5ab064de576c1681e7a76d2d8715b364457209c03629b247b2e7cdfc545d3e430217f9236a9dcd23e6d72bcbf07a0f7988c91cd455026abd5164ed2bd1715adde9189c7d2934ce6915cccebcb698f9a51d39f4202f06194ac583f9ecce38682208ea5b8b7bbf771c67603679aa366446b50a20107a0dbdadc75a65617434134599d63329d0fcfe00107b3d57a8852f0ff1ea9390fe8dad796dfd9134dd6453c132ed1ef95a3d0c7", 0xa9, 0x7, 0x0, 0x2, r10}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x8, r0, &(0x7f0000000380)="7c17", 0x2, 0x40, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2, 0x1000, r1, &(0x7f0000000400)="590c70f351c68f9c094e11f675a18fc22e72e982561cdd8c3c18ce24be396659ddfaa01681363dbd99451e63fa4b3cda5261af58056628cd3d4beb6aafe6cfae590f77d533c2634e78a2762a6b868f265fd15b82f543ddd3e0b010917acf8abeeb1385b831d98d682064b0f7c8b436252086ea9743aec460258f7e3889a40ad615db8b1e8fd754b661af6300a878a0f86760d27501d4", 0x96, 0xd7, 0x0, 0x2}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0x3, r0, &(0x7f0000000500)="20a042c44ab878d069dc1d160d14341914485ee84ca94edc6a279011856df8b82d8a3ea5cb6fd462750d2caa9cfc5ecdd66cab25025194fe3fa278ddfd2e9d4d76beebd441e46a4ab416065bf759b29ee90f9d3c3ddd0af99ed4af8c32c3d6c9", 0x60, 0x1b397eef, 0x0, 0x3, r11}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0x9, r13, &(0x7f00000005c0)="73fb489026d88c6b72b709d8dd915831fd085e22bce58e839cc52fb5420f1b6c9759600f805cba8b8d7057fecfc6b6b45c76f01d15", 0x35, 0x1, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x1, r15, &(0x7f0000000a00)="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", 0x1000, 0x10001}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x5, 0x1, r16, &(0x7f0000000680)="0c78dcdad8ecf1a51dbe1b1be6e3a90f041aa3a67d55214cbd1379debdc258717f6a90932a76e836a593081bb21121be0e3c65d436f715edbd6558c3914e066e929e596dfb9cc96a4a5e014d988e54dc40dbc7299a1a3edbd426048ee866d42f56ac3989b276cfb46d62a4512519135c10d180aa85b9a190096aade0510237b470c2e68ebe1b1fd874d5b8dd2364397a639c7834d4d03a783b9fd82ef84cd6a381a9ea2ec10d6b3ec46e9d4aea79970ea6c7734f01b34a3aecf86d4c52d6056f1e572a77f5c7cc4575a674c4c0d945e2d9bb09", 0xd3, 0xe2, 0x0, 0x2, r17}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x1, 0x9, r18, &(0x7f0000000840)="d3a817e7602b6fe921ac67eef98b949dc8d8fde22b4556c237282300b80da123d6dfb89393a452bfdaaeec5fb2750f21fe4e19cf2677efcb99bbc4c86aa4c6f499a1dcd4be4b32501a8ce72c7a18d4b40b66f3a45d1618ed6d40187e657b16875b6ed66dd7a88869410519e8df75cb32e6b67b14d4acb7d7583cbdba10216099bf8a0ce3ac7d29d8b10b35800ecc07acfa9ec3a1a4c06504161eefe7ebc7072fe170f69b8fbda671380d656c4bc02a4a0dcd1aed844986ef16e9851d707c5bf712de303f59db0ad5b2b6f922ee", 0xcd, 0x4, 0x0, 0x1, r20}]) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x63b) 00:58:04 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000200), &(0x7f0000000240)=0x4) 00:58:05 executing program 5: socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:58:05 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2458.223484] audit: type=1400 audit(1575075434.844:487): avc: denied { read } for pid=1688 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:58:05 executing program 0: 00:58:05 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x6) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000fdbff8)=[{&(0x7f00000025c0)="290000002100190000003fffffffda260200000000e80001040000040d00140000000000132eb75c35", 0x40d}], 0x1) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r5, 0xc, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xd, 0x8001, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x480100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r5, 0x10, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x1c, 0x18, {0x7, @bearer=@l2={'ib', 0x3a, 'bridge_slave_1\x00'}}}}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x800) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r0) write$cgroup_type(r6, &(0x7f0000000280)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="c533eb44561fcca2e2fb85a18d98f435ec9549464fbb4a4e9d66855dfd890e926a30097e8ca0844f45420afb29079afeac6691072d6c4b670df178"], 0x3b) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x2000, &(0x7f0000000140)='security&(%{.]GPL,^$\x00') setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "91b2de576606"}, 0x7, 0x0) 00:58:06 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000280)={0x1, 'veth0_to_hsr\x00', {}, 0x9}) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c460200000000000000eac3b40003003e"], 0x13) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r3) r4 = dup(r3) write$input_event(r4, &(0x7f0000000040)={{}, 0x11, 0x20, 0x40}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:06 executing program 0: 00:58:06 executing program 0: 00:58:06 executing program 4: pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000fdbff8)=[{&(0x7f00000025c0)="290000002100190000003fffffffda260200000000e80001040000040d00140000000000132eb75c35", 0x40d}], 0x1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r4, 0xc, 0x70bd2c, 0x25dfdbf9, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xd, 0x8001, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x63000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r4, 0x4fef7995ac3700c3, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x3, @bearer=@l2={'ib', 0x3a, 'erspan0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) [ 2458.460919] audit: type=1400 audit(1575075435.084:488): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:07 executing program 0: 00:58:07 executing program 1: syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT=r0, @ANYRESDEC, @ANYRES64, @ANYBLOB="1efdc96af9ef0178d1d0608dcdefa9ad650bfdc617a025b7995883a22f6586f8c4de782e44d957ba6dcf9c057a357cf5b2a65b4898b0050a9e4e35176744fd385d1106ee4a3f65bad7c66ca545d9895562a279a1810e36a3e58bf61a57beb3a5edb80028e221235d34bbd229019b60ffadfdf875f96acbc7042d024b946cb99a", @ANYRES64=0x0], 0xbb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x3, 0x7) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:07 executing program 0: 00:58:07 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:07 executing program 5: socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:58:07 executing program 3: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)='$.6/%cpuset]\x00', 0xa) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:58:07 executing program 0: 00:58:07 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = gettid() tkill(r1, 0x10010000000032) r2 = gettid() tkill(r2, 0x10010000000032) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e24, 0x4, @empty, 0x1b984f7a}, {0xa, 0x4e24, 0x1ff, @mcast2, 0x1ff}, 0x2, [0x7, 0x5, 0x800, 0x4, 0x5, 0xb6ef, 0x2, 0x7]}, 0x5c) r5 = accept4$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c, 0xc00) write$binfmt_elf64(r5, &(0x7f0000000100)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) fcntl$addseals(r6, 0x409, 0x4) 00:58:07 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x11, r0, 0x0) [ 2458.463247] audit: type=1400 audit(1575075435.084:489): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:08 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:58:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x4000000000080002, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2100, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d40)={@broadcast, @multicast2}, &(0x7f0000002d80)=0xc) bind$packet(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 00:58:08 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x50000, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000200), &(0x7f0000000240)=0x4) 00:58:08 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x180000) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:58:08 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window, @mss, @sack_perm, @timestamp], 0x4) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 00:58:09 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c}, 0x1c}}, 0x8d3755706234b1dc) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r3, 0x0, 0xedc0) [ 2458.542692] audit: type=1400 audit(1575075435.164:490): avc: denied { dac_override } for pid=1685 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window, @mss, @sack_perm, @timestamp], 0x4) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 00:58:09 executing program 0: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x6) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000fdbff8)=[{&(0x7f00000025c0)="290000002100190000003fffffffda260200000000e80001040000040d00140000000000132eb75c35", 0x40d}], 0x1) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r5, 0xc, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xd, 0x8001, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x480100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r5, 0x10, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x1c, 0x18, {0x7, @bearer=@l2={'ib', 0x3a, 'bridge_slave_1\x00'}}}}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x800) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r0) write$cgroup_type(r6, &(0x7f0000000280)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="c533eb44561fcca2e2fb85a18d98f435ec9549464fbb4a4e9d66855dfd890e926a30097e8ca0844f45420afb29079afeac6691072d6c4b670df178"], 0x3b) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x2000, &(0x7f0000000140)='security&(%{.]GPL,^$\x00') setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "91b2de576606"}, 0x7, 0x0) 00:58:10 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:58:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window, @mss, @sack_perm, @timestamp], 0x4) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 00:58:10 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2458.856345] audit: type=1400 audit(1575075435.484:491): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:11 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46020000000000000000c4a417fb07f1e6aeee7ce94ac6021642661b36c9f44d2a82bbc531eae772eb91634abd7a5b84231a0f734b6257d3d92b901eff37469bdead3f1d5bffd35763efceefe626e1c20fe370d46a15973d385a7bf27c6701c2ee14ad778d1c000036aae4d9d777658f18634e3160b0e037eaf944b5889518ba8702a5c851a5850000000000000000b7d14e7ee157510b63b1548e6abbe69a19af0f39686dcec7dbe9559929928f86a761727508d6da36964d9ba30d51f67b184c724dc224a383ae8fa10cf29e648c5416490465b17ab7cbf1534ce0e2a6526490cc8a351b2c28624c0fcc21e1b4827cabd95fe888d9d47b559b503818db909fe6362e97552cb7c25a4c721c4a7420b479fcda2a87bf95ad3fd05c0665fe3faa7e3b120fac57a0be2ecc7d3b2c8f6a29180935cff2477b1471b3edef806c99b47e1deb5303941f0990b48da5ae7eb3e3f8a2479fdbff00000061d76bc5191edbe18ad46320e80000000000"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x8c, 0x2, 0x6, "4d4725850e28934ddd72bbdaa13e3fe0", "09ed7133eee0d1035c958f306c4c1e661f7900666a695f4deba226d94c4020ec67ffee683dd79a76e579e1e86e1aa87e19af9eadc58ac28b8a7cf131c0d73b5acc70f7bf918925229f1ec4b53bd38492508cd9070dd09cc3171799f5818058aa4df2a778966009ac1228399e700e0436cc2a975031efec"}, 0x8c, 0x1) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:11 executing program 4: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)) r7 = socket(0x18, 0x803, 0x0) fstat(r7, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r11 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r11, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf007488be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea2572007f895d2f1f1669c902e24d6169d941fbef0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35e6d75ea56247aea29f637a70550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff4976367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20cc14465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb"], 0x3c) sendfile(r11, r11, &(0x7f00000000c0), 0xffffffff) execveat(r11, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r11) fsetxattr$system_posix_acl(r3, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r5, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r6, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="51672b7993647dd18d7c00d1775e9937967dbc7f76d559ad9233e863c4f8dbeffde6de21b11e52d16c22db199b7d00e6c50b139b9859a01eb78a36b1f277214bc7f48bfd8f047cf6640b5d7e34a7599060304c0d605ad5501000241e218816b9254156c80d440ae20b4c2979f305510422353ea6455c4463317044d717c84f4a4c5e46866cf6d373c3764fcf144034346f6bd6a15ad18216b004c3b98126e90d4a670000", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32=r10, @ANYBLOB="f2ff0100", @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r12, &(0x7f0000000200)=""/250, 0x50c7e3e3) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r12, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket(0x18, 0x803, 0x0) fstat(r18, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r13, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r15, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r16, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r17, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r19, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) setregid(r8, r19) r20 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCADDDLCI(r20, 0x8980, &(0x7f0000000200)={'bridge_slave_1\x00', 0x5}) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r21 = dup(r1) write$cgroup_type(r21, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r22 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x7f7ec638eef560b0, 0x4) execveat(r22, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x800) r23 = dup(r0) write$cgroup_type(r23, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$ASHMEM_GET_NAME(r23, 0x81007702, &(0x7f0000000000)=""/138) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xa2ba}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8}, &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:58:11 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:11 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2458.893098] audit: type=1400 audit(1575075435.514:492): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:13 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:13 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2458.906201] audit: type=1400 audit(1575075435.534:493): avc: denied { net_raw } for pid=1727 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:13 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:13 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = socket$inet(0x2, 0x803, 0x3f) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @loopback}, &(0x7f00000004c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = dup(r6) write$cgroup_type(r7, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) accept4$packet(r7, &(0x7f0000001e00)={0x11, 0x0, 0x0}, &(0x7f0000001e40)=0x14, 0x800) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000004240)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000004340)=0xe8) r12 = socket(0x10, 0x3, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r16}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r16, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r16}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmmsg$inet(r1, &(0x7f0000006980)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000080)="09e8383e71af005ca7b9cffa2cd721be5302af8d30b988e0a2eaba8274d5cd01bbbdea7043cf52c87a3d6570f9b921d11ee8823188cce8ba6bdf450222fccaa6834ae91355ef57", 0x47}, {&(0x7f0000000a00)="b74ed8d527c4f19640ae2427891e37e3bf7913e1e11a81198580b723bcab03eae66d0a6c36066ceb1f8f534e41703c0349a626bf8926a26e0382c8f3a18e0e6c05cfaa95ccff2e85dc41be7397abd8fe115489e0fe30fdd677af372b9b63373a41df49100414bec4ef87d6eba983170678a0bc0dbd13299d26846f549b4927efdedaffb84634c52fa48e952d1d220271c3183e1007ada97c94ea3b4497b6e3b2a2ce548c03b9d299b5df6e2d9fbb6c1d5d339ca40b4052fd862e1c52544a0ab717940227b916d574a41fd98b5e46c6f1c9096299a5e89a3c5849b7c2480f88035c2f8a4aaf049808598d7d95c5cde0c7afb2331d5da580ad898e232630750f82284a68d4778272759d31f43895aa5668134184f30250273ea60ccf05dc0b9be2bd1e619bbbb696d6b4d5b8d0ff4c4aea2115045f98eec8c63891ac9dc36124b6ff23d1ae7e1ed4e23f60892ef1e0388ca817df57ed6cbe5d515a7dea0302d4f10846247b2879446e89649fb7973517b5582d324da4230a4d787d2d85695d660fa9bf3f98e828006afffdef346eba240979b23e1fa0e4f4edac2a0e45999e1d3879e9513d22f6b26e215c3be1c9da739fe1a35f1ce870d58044106af20c5f972e2c2bd254cfd60f737d0bdb7f536266d5d25f06cbd7507d2bb056497e27ce47f01b2c991fc95cb24ecdb807962f95223ef49a01e26d68828c7d4278b06cca718c61ff72b21ba2666e1d24121fb20634527843512a1b816baab30fe1f5943d6326623f19a5b15552d7ccd6c558e67ef5556431f42f9d76748046f7a40b987a89af5a1acf2631b7d64af8c15d95582f406ab8221f9b550168bdf6944fe120c827efdb80ed061bde03fe0b768206083ae5946a1b280696a993c9ef41885c629b1ffe2362996953110f29ddcccb6ef5a660afb6cf7ec9be8b9603edc8f091c27c262ad924480a1ece6ad02e6a9ea5f0729c2e8d02ca506e1fcd2a1e5988d7440115b57f2ab46331a734c5071bfb137524660fcfe8388f68f97435f8ec5f76c97b5145b0d1174cff9c8022ba458366a129400b095a3ca0cd73d9463809fd9e4c1247c40c4826059b3f02376ceb70186cd9e8cebffea37ef36d9fec9d39766769bdbe4ce77b6a0b41f1f60fc98c9a3f3b5b2e2d2fc5d8bf8d4b92aa2083990e676f825285ef7ca433357fcd0ec48d6ad9794138618e372ccbb16560d91be88e0a67b168b421f6971ec77706efeacce58c77313a316074ef57421da90bdb7b5e11a31da2b3ccb7e3bd2d80479fa71187a8ac85401327c132571bd847ba8a6a8fcf1a5d60d2877dfde7926ed56477f6e172fb09cf42b87b3577dd2cbc2aac54a1a7c564a475b17ef2c9b38e578fbd101f0c5cb66de2b17859863bf5ad4234a16571db330fcf0f8120b768637333e721ce31ee84cbf7eff1b731f48a2c4dc88b1c04be61b9f45a985f9780e1fba274ebc679c0b229686b650f7670c04748d6de7d78030715f99153725402e11cf878b8cacad09390abee46415bbe1da665120bc20e824c4a59c8e4a21c3f9a60632719c8a389ad76ec87d2e90db6c2fc108675f9344a05a338d34153cf31208285ec3b9a953fb929ab064b111889712a15d0df6122f09d93794a062645a919e980d03362dc06f982d4a7fb555a31aec63f44b3aa02325ce05ae24df3e92d66d008181fc2be0f841682f223d3fe4f50646ab35917aa99eae5502fbf97137adb3832acb25ddc8c5acfc09db7159c5d7d7d98181a73bb2c5ad9cf7c1acb6a9664d27a0ea2970cd18be9df4ed83fac4e6c513c2479e44a58185eef40fa10869bc4b996eb6d7b8ea1edefbcbeaa077e64ab00542b4b30c78e7531541dcf96b6aa36c86343e953a1de13d6fe3120bb6bc838d90958ef82451b154362c33a46dedce1d7ece879aceb4f8d55a59568b215f586d26a60c666dbeb4ebabf138c6e290fee2ee8819ee1d21c18c4a2db5234c06e1ebebbfb54a557538ba1a515118c020e983bb7b0101bbc511dcd5852099371d7543a6c19df9ad15f597e71514c2e8bd9ffbc8bccae8c23436bbd6f920f19a44f8e40ecf0a629296f7839377889419a76553f4f3799e58fdcd31c46c41f17da3124e613ae0bc300f92f0d9b788174421ca41d25aaa0c220416c6e0191ae72e742dd1e5ce49d72b169315d715d4bbfd11a24d0c83205ebdf54275b176b7571edb257ef65eb8c1541f34663a03ab074ba0dbb3bbd654a588c7efb58e3cc7656d1ab5878fc04a95a2fd4eee3e67f52d824cf3c6cc02b262170cae60d33537a6c3a68082e9f77057e6b4d0881b03df50032f7f0294755273f268e14b726242302dfea573605c6fe16e5da321256f54ea637a18b163774c51e75eae4378feb576d4b1fb4fd4ec2721e9d099c77953df426d30b38b86186e282247ed54606443b59e54ed6104200c6e3d629e7a391b0e5de4bc4d2132d278b3c68e399233f828aa1cb0ca16b102f98bcd52c6f4c664cea64c0f41aa4b74710e7cafa7b04b596cddba6f0e3e461d954a2f57c22c7504f8498a04d12e6367ca65b81367fb44f95304a0f217f8f84214ab084ca3a778ad70289ecc8eb8a9c174869a29bc2060158504cd1388b5453d8d80684e758cad4fe97e1ec357ed2869f9bb52cbabecd31bebeff27902178903a1071798928d64d2d630108ff229f190df2941f593cc5405a447464ddf744549285efce9cbf68d4f5bbdaad15b2ba7aee1a9ff5f8b1304477b1b96f6f7b956e26f60b3a8b2e47faca3235492cf7a0e6c76f5e6d2a5f410cfeef091b5adea21828ecbe6e7239945992b26569d47dbe91e1e29800efee897ee3e4a64d69838e0f81cce390f4843e39510f8cb06347581c214a550df3fac89f70e05c3c152e86be96e2e1462379ed5501c559b4a5ac6eb00f6578e6603a915a606828e82e8dffd7dda5d0cbfa6fb62cd9d7cac06561cfc61d07d98c58e6803ca9eeddba10affe38a7da4962d1a85d7e82cc92697655b1fef39af947f156595c83707f24ca54dbb723114c1f5e18302a7d7d901a4c61e9ab9625efc5a1e43f41c39e50b45fef878aa622348765bddd00f0cfff812018b4aa9feb126dc9f4a3354a4b8d85068dafbe24494974e3db97af9750d589abdb3cc1944866d52099629a75366c9e525a9617ec46daab76ac0f7f02fe22000c8325f73f67134c822a5fb97d95914fc10b82858ff7c7733202447fcd8a1b48d87fba02d49f42ce742b142a90be5aac6461951b8e3fe85ea96a8f059396b36874cd900da01906601c697f31905baaa78bb5ef6f77f33ba2cd04cb42403eb3edba41bb2663190eb3641eaf39b77ba2d661d072fe5fd9dd06fca54dcc260eafd1d4b56746488fa543ded65ef34c5d73834c5ab68a539590756ab8a7a9e01c10cc36b08b575d7f93839e1268c65ac78db299dbe50bf646a9baff196e16444c8b199fe98b9ed30fc5cf496cbe35503da1370d746c8d82a570fac694c9a1cd2c38c304d8144f59d9760433b00d556d977866aa246c76d105c1f0fdf7e78ffe763e6cc0f274a40a806534e83bec6ac4766300f751d8b87d2e36af0cebfe54755743a6017b85719f2fedbf256246bb3087f98bc36eede1f9dfd9cdfdbc25de5cc60887a305485d8aecad12beea778ef59cb20e4717e5b8f95e877999b1c311e3f5c57f244947d05110f32b905783af26e68b1d7048503cf346a90238a3570048432b061ebaec9349b4e7d000c444bdac824bc4005b73fd282ad6c8bccb2b60b8a512182fba0bc6efcc7cf1b0fb12071209043e5a358868fd2e4a8df3553f419d2588f21368a20312cfd301a17f55180522079cc99e2232791c729678a7eb4002e2a6178cbe725f287ced615020f04c124c500217df8f3860a6f9d41c64da8bd3feb1c4c894d0029bc1cb62d43c39aa2e4f2a9e5b477d1bc73e08cbf1c53bdd39c3f88319acfb77a4909cffa3af2049a002dd4934b13aa9bbe9a3d09bbc11de0c0610a567ff2f822960b4fa675f579b14c9645ae23a1d34a3659824bfcd6a798d179dbe926c0f25200caa0aa3f86b40a77445868aa7ced6c81883252dd5d65039422f649c2b4a25db35141e2d4ccde8bfa3f09067b4d57bd33113903b90cad75460ebc091906813172f8bf2323cfcbcbb634d9dce1e2a82b92b6e49f57b3e5245c6f7be80155ceb820be2afaba28ff6bc40fbeac3866701ddf0d6d0a6ee4b7b27b4f3dc5130e46ac21f60506dd69a389e7566f2724348c5f5b8f2581af7c9d168221987b3a237edb7f42998e7842a355361b04aa0ada0c649457cca7c43537df7b969ca88e6e6502a8c0e5237b0fb8c1adbfb05f885397d1d148a62946c51ee75d8c6e1224800938331edd781a9127f75846cbbcad3750188ea50b2f14eee55115336244c57de28b50999815fac372ef0f017950f6a258c5456bbb6f5a24de098ea1b470210186e05b5d7a887749106d733cdf3d28a0c4405b50311da532a2aaec72b9396af115f688044d17bb21ebf74066e32d7774862729ea825a4f64ee0b181e272e716ef7b92ac56ffa1782b6539d1e36806d0514f312c0e1b5203a3d73ae8461aa4b019b0b6c4c0d695ebabf8fe7278f437c42d0c9598e81d1c983652ddb18e95ad7e09389271a9a2542dfedbda6c6173bd3b0b341c02821ded27c5c75adb53c4b343b1b2961d471d4ad15b589ffe553268aa19606d9d2386f923f0fd6fc1f288c36ae461fa0b76da8284b9633ac5dbddc1b180613a7d06093b5b34e67d2649344f9ad511c2534d24ef2af81da53cf2916bc972a666bdd48b479b8971f1e87430410ae2c91cf1555f6616ebede375344ff83cbad357a986736599529d0ce8d835f2020c35a4baaf6a7031ef3ff413220dcdb3e3b5c501a5039ee52cabd611c4009fe69d686f1ca84c1d0f36f555f7076d19b6ecb79316d283d477c864a769357f9351f62d84464a3c671fec627b2a78adce792bede1c955fc665fc20058e9320a84a0d7443b208b1a591854f2b62b4f5db4d801c36300bb9e1e927f44a1d22be18919278d40feb12ec07c1e820756c6164a1a448fa36cedee0b964d830d93daa6624c15db7fcded905d935b8f73d5b465cb0b30da1aec6390d14c562285534d8e80f89f38556415ed8d659087472e71e9e2ef601f563e1dca6743a8efd70f067b78521a9d32740f0c3b4227a44ceded6cb57b88ffdea753eaccb70461c6a9565698f8d03e044481071c7819c82179a3a30868039520f56ca1b85f8700932a376f65acdb99be5f8204afd6141c9ceda7d46ac473f1be2ad39eee6befcfe0703e097e3124f26d6bbf5af8657ea097755c080a9f95fbe288572590924a9b2aa7be0e5de0d9946e269bd1ae851e3606c61c0a82cd0249e3e4452f10a7f90673999d3673a4539470baff5c1749f7b915843a31b2db6858ba4e1903326354596a4d706ac664cbfa53644282d9b78e4cf58688126b9059aa7367ea0a2993e63940016a62e4d543c24bc38eb7bdd028308ee7c70aca8c2dbb3ad8810315532deb639bf2252c94a2f63c9d5b689bc39c48ee2d416e2592b2873a56fb082f2c4096653f75b0d79add820a5481d66e851a3f27a187170719590abb0a4dbc63505f97ef6aaef33dde7ac6e86e1a5bccb07c2d3d86bba339d752425693eacaa039470504101ee8de4d8e90e3148a3ab4da58d24414c0364538057c9cf3df24f44b028b8870aa4f0a17d53ab691f2c8577fd23eae4cb58cc241969e9513293ab7da30f548cbc7bbf01f3571668b30633e479c4efd7a06b6ed605be7aa423ed3d3dfad", 0x1000}, {&(0x7f0000000180)="04ce82a908ed9f048b81231ec6d084e3fb3fe4f251adc4a860a9e29bb7e63628900cb342d595cbff8143237d869d648f5f1f3ae599a7c30761ac493d15c902bac95023f11a6db9ec074180", 0x4b}, {&(0x7f0000000100)="4129b23d4071234563298c67fee846a9dbc8d4a4bb3b6d315428e6589c8bbbb36c1aa441bc0874f76e6ee55323c4a7a092742f0810", 0x35}, {&(0x7f0000000200)="6ed0f8db22f3d8a6c5605490e39efdd0050638829f74a0543c440134f5537485b7659f260dc8dd93f2f17dd364664c6d3736fe56f1b93b1f7c9a6a592f157709c01dfafb9d0d1324042b13b3b80eacf52f2233ab28de806668e6bb1a399dda54fd1818d910cbf7cde2ef9f327f6411f49c3a291ecf2e167cbe3c8485e71252c953699d3639518045147f540e6d18a4ea75f62a1b136db9f17742f15820bd86bfd35f7a0e2f00d2bdac523213d9b58c", 0xaf}, {&(0x7f00000002c0)="2e92ea1c84f93601c6d2c38e790961c363", 0x11}, {&(0x7f0000000300)="f72b4e3deb7c2b8c49d4bcd3f039a5d48c4083b29479a20b6b76aaa5ac651e8c353c2f63db3f3414e6e1983f320fec83c4fcb5d67c881700cbc0bafc25a2244b", 0x40}], 0x7, &(0x7f0000000700)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9816}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0xe8}}, {{&(0x7f0000000800)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000001d80)=[{&(0x7f0000000840)="88420c2dbe738bd1a3027ce45b26b8fb4c4bf634c9d18a253d44e218a2503bb2ad386311c3da1a2d9cae6fbd977ca642c9743a8e9f2454ac3c1c4ccc12578dde46b874db8042e4af4ddb4b9daa449fda4a64836004602ff42f13f3e976d6095ee09b04d33621811a7738fdb53646f2ed9c20911b9524345a816ae6f3e41bd10c7b6a92e8c16920279a508eef1570496879d2b5e2e248ce26db680b06c9f72897b32426990ab463c460175829b61b70c78a2ef42507a17489e405f06fff3d98e874afa20369450955929065556761fd7f6b68b5c383aefecdb69adf2296212960fc4b3d7961a75fad743ee00ef98fb62e2d3870c65564f1", 0xf7}, {&(0x7f0000000940)="e4982a3b041f0c9c3f54d7db35bc9f1c952649e85ec4954abf96f92c3440118b82f65c47ad5a54a0a1d81a1fb6df518e006fbc40e7df92a364ba2478ab2a35a39300cae278643fe9a8e660e30bd84485b70f46a6a7206c279cea47915c78380e23089e40f7fbd4ccda3783388da9c62e", 0x70}, {&(0x7f0000001a00)="802a1db1f7290851f3120bc9008aae4777a399f591752b646551318a3b528625ac0882ce392bca4eabf460751beb357d03ad5f1e36f4f48b725c052f592eec0da1c92e5aa6b35a0aa8cfaba113570a6e78b571a78f014637901e9ee855b2b0267a0dd25bd7d69d7c96", 0x69}, {&(0x7f0000001a80)="f51d0b85ba37502beb8c38cf8433258afa25e03fc0400a2bee98e709ca6124c3578ae3603aecbe2c326058113f8e4b5a68b7cf43e30c4ee00e123d6a520d49ec67cfad4c48fb8840928e10efc25bc37a6933850e597c36c6873fb49e5961eb6bf6063688b61e746ab8c0a52dc44cfbc9349fd287d43cc6a95f5f7f1d37316afcd4721b25389d2f6278545b5dd263007bb5f37e2f563b43", 0x97}, {&(0x7f0000001b40)="a3", 0x1}, {&(0x7f0000001b80)="cbeea8462e1ea532d7551408ece36b20aeb939bd212aedba6c0e3020154fb9128e4dd70764ddb38b4e3a4314ac0c335a423bc1b9967a1cddf7c3a196f955ba678c182242a5c31700aac95f79ea7c8cc346e49ec88d516165529238ab976a", 0x5e}, {&(0x7f0000001c00)="08ce4897ccf887883cedbf98079dbd2d6125e5327cce23b023e0cd6f819daa0e8e9500eed86758f32f5288a39b6c8ec13b1b8041fed00276ed215767fa85c973504bd8b60cdccb80fd83127c8374a7a0da51bd360f49c867f1f55512beed90125d5a8ccaa637b978810301a15cfe07d6294c04ffc63ee44cacdb7e160a1e94a66badcdc90d8bf44962e9b4375a53f4d08791fabc0383fc3379220e4e87921374", 0xa0}, {&(0x7f0000001cc0)="4fc5dcb190e4e8a21cc3bfeeaf5aee18026e0685c47bbacf2d658e9655524d398804a352fa56b71680f95b92561305e74d0a84d4f775d72e5c3d69ab93505eca57d67118b1c49ed91a32e3642dbaa4f0ac25ed34b2a1f268cadd8e978d476e4d0f05f4fb5be4086310fcbc9d75db5a546e43d47a56c268b80e43fbfd33494d5b6236292e41e618d558e1dda2d968bd820e90a195b399e3ac924c6a182fd49326efb9b442a906ef678ff71923", 0xac}], 0x8, &(0x7f0000001e80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0xee0e}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@generic={0x4, 0x2}, @end, @generic={0x11b, 0x6, "0c348f55"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x53d}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast1, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}], 0xa0}}, {{&(0x7f0000001f40)={0x2, 0x4e23, @rand_addr=0x3}, 0x10, &(0x7f0000002f80)=[{&(0x7f0000001f80)="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", 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f0000002fc0)="7a7d8716a4b1d51664f56895ab29132f45f0425875a010a6dfe235f52c366c73167e670cb744df0a3200477b424bf32818b8e0bbc1ba120d99dba779ded2a76cf0f1aa5577435a461c2b492b6bd3bbab3ae2d9f511a0484858dfb8e5ff64b70445a10a5732ce16ee4db095a4d39704fdfd5e495282184fa1bae1bb6bf2117c5f6f91935b3c448720ab3c366440c77fc2cb61b6123e804cbab87766cc473523df11823627a91c9cd92c644de6bf956e38", 0xb0}, {&(0x7f0000003080)="9f989dbd5913e8d94f9f9f079038443caefabb9f26708a9f5dc2dcaf2d6f63c60f0a06cc8fc24a4175e7047fb5e47aba176ede4d417625cbe886a41008358062b922b8b73e7b8a2e9849ddd4ef4cc632863f8e5dd38a50e0a9e31731eb13b80bc743640ac4d6942c96ea61ca8c8004ef048a1fc3b9363b9395fbbfea0533b70124617596d15ecaa1377187ac73f9fc2cedc361f9bba0e1f575f5977ee1ef0d954ff8b8bf77da3c58ec177b1c16046bac1ff3b6d5cdc42cf80a1c14a9", 0xbc}, {&(0x7f0000003140)="102d938bc57ecfdacabf543142b08451fbede09ea9d5457e23e847c94e475e13aa128829907c8ea5f76c3419be006b95da4e47eec8ea32a635f9275b07283d00c67105296879ccc0a149060b6e48cb0645fea9f941707c36172c596a82a7f598ab236feeb70d3ecf30a22cabec967682af09b99533a525f06b59c13209e962dbcd6b7b1ba21e55d377f4c18716f3382fb02497b073f479ef37929536f6797142fb062cb82f6b282add27650b17c61d3a05383a139c9f16e2ef9740addd582b", 0xbf}, {&(0x7f0000003200)="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", 0x1000}], 0x4, &(0x7f0000004380)=ANY=[@ANYBLOB="14000000000000000000000001000000030000000000000058000000000000000000000007000000890f3fe0000001ffffffffe0000002071707e0000001ac14142b0000000000000100ac1414bb891ff7000000007f00000100010001ac1414bbac1414bb00000000ac1414120000001400000000000000000000000100000000000000000000001c000000000000000000000008000000", @ANYRES32=r11, @ANYBLOB="7f000001ac1414aa0000000014000000000000000000000002000000070000000000000014000000000000000000000001000000f9ffffff000000001c000000000000000000000008000000", @ANYRES32=r16, @ANYBLOB], 0xf8}}, {{&(0x7f0000004480)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000006900)=[{&(0x7f00000044c0)="c588687e754cbabf720db4c446af33002a93fcb4e17f4e59d5945ebebf42c41788050e35ef62b757ee4054524ba44641928fa9275236dcfbdbb659598091b3f4d10d7691da0163b7034099f8b501e63d36d3e84f62a7ee0e8e57f4e39b098ea4b47c8d1d28f649dd97d8aa95a7c7528c81564ba1ed22fb88024edf115e2496698271f31754439848a88aa572b454cb633b4a7b85d0f7a2cc3beec2d180a899602fc14bc38ffba2adfa3cde9807b4f46ef023891ba83b9fac724502b24d7882f3917967e2a7e46f071934b8c53a298c123a6bf9244c421188a0d4ff2735527e917b60ea0c3ec229933675d1b7e9dc2f489be53647198f51b0", 0xf8}, {&(0x7f00000045c0)="7656dc5c864f0ca9b3ed3913b35cfca8f0ea52d61b584a837841f9e66d92b9b4a258e12fa83d5626ffc487d3229c68f9b037ddec3946bd347ef9d7d4e02f5eda406fdfe19f48d215d05069368efd36fe584d773fe85c7322167143cadc6df8caae71a1a7af0b9e7115facb5245b6754eb7681956e9436e1fac2743bd00096bcebef58c3744a486ced0cf221a", 0x8c}, {&(0x7f0000004680)="514c8111c4b73defbf853e3ec225c2300567d2c3f1f6782fb596cf34b4ae496540dc2f7b3eded2144b1f1f8da9a5e08147659607f49afde6e12ef8b47c5b2ebfc2c19ab118e9b50f10666d48163645a8e0740b00d07d2a6b6a7f78bf6a4029fd50dfb28883892b71d94782e9fa7957277a10c134be2020e5215046749b18d06bc0bdd9f9e623d45073012c7def4ddaad6ee25b9b8f3637cc2ca7353f71962241ceecb5d6854c39acfcdcfe1e9a969f7006b3f123830f39c172845eabfe6c0541c7c2e7a9759ec2ae24b5f599756f7b48ee13853e", 0xd4}, {&(0x7f0000004780)="c4f198632b023cea22bc105ea5a2d14208535295492527da14340efa2d31dfee52a30e0fdf9bac415dbe1a633ccecad44eae2106ac1ef5afa42ed1de340695c4b3819a87a2f6c5655b29ba69b90127c9607f173ebd4242053d48dbe5be1ff25b5f327415686a407d8a17ee2ce89475f0", 0x70}, {&(0x7f0000004800)="50f43d7eaa0dd021e5301a9a5aa92764aa0591bfc1eb1a95c9d7640cc7a5f03b771b8ca52eeccfd1884ce9b34a763469422497f4b536c081c4b6a3af43a900ca8be6210e5ed31e0d365ced789d3b331be59c8409829273a80ce7aecaa231f178ea46c8116a2269033e336701ac23b83b9e28b2d00b7027ef8f216c1ef470088b14b05b02b992b71d9f442fc5ab6c6211ef084dd16b2338d8655b59c74ff43c33924a9994f69ec415f28e4ddf28690717d9686bc190d3c46cebe766789c23d09de6e4c0ca0a1c9e2df945db169dea1efe8a3c3b1b2caefc7b491e1d6209e7caf2dd527e63be300a9b5c11690cc63b7579e39003f9b854f5b0f53ca863617a0c5ab8d26874ab4b490d7b642d38fcbf1a56f16aed8853fb595132aae7578a1a2f66a26c2b53efc753ed59bacedc3c7d3bc06f2bc9d60a6fc8fe4cc62bbbc7969553f6ebc97776fd9b5789b850a09525d8f97f08414fcd2194b8bf4e45a287ada2a064fbd2c9b262077fa8dd65d8350db069385487f10ebb011c8bc2bd9372856b3b2599a109f88680e9244e418c0316c04f00afc92c6e7a509117856703151e6d8f8edf56277fda069474f49291947c9b727203e0bbd6c48a79eb77da878b2545063674ff0a329787b6906ef6a0390ea72f48e450c60cd1df86d76fe39ec5c1a0139700abb6641ac282b9b8238d27fa802d1ee08f69857b406940ffe3ab15198e0bc208b8dd0dec63f0de261b97b604891c3a537eaad16a66ad494a2e0187aae021030f609d2c81cd38863940ac0b0bb4b608993291af1982bda65ae2983dbb94797db26dcf13534baebc6cb9861afa0baabc612c46028eebc7401d2e41ea1df429eebc86eb5c9e427ae9dae99f4caf114ca6f5ba94b4ccf8d0570ce92d7d26482785c5fab6ddde8c896874750809a6efad5fbc8e573fb808449fc7fe853604e04c3521bd27ff8d8886ed04fe043f483a522b12e8d8b9f382127c22bf35c385f485b83a144bdd3fc8c9ad537886ab4460e32ee8440b7b598716d8fc8deb104299bbdfa4e70a58c3ef7eca06348e0a28d28f1ce4d117d99cf227dd13807281632e1277b7748507499032f78ede0c151d3168732eca49b1d2584ed8449fb8ba87a26f00fa1e89c6709760f22560cbeca5a96a5d3e2b8c4c29fc1756a39b4994d6fe910987fcf1c1bab4dece0f67a8d3b335780a81ac2524090440ea64d01a002755c37d25d5d8924c9b672c6d562b000574e694db45d9e7b6f07525d13273b97b16b4b9d149aa5b07b9518b25e926aab9e6b8524f9b0525a5dcd94f932f3d9f9ffae59929340554db1091fdf06894ab0ffe5f5476708a48944647d532a786b1e1e89e4efedc9a3ac0722af0e1faf54273ef2dda402b2306df5c548b6ae6ea0c167f857dcff23d91fb42ab651a899001d191996ba8d15584a9550704310a4aad77b8606e720c51f2df31661c70a515ee1dd6a01658734a4992c37baad1166a325a2367dc7239fce13889e8bdcee4d8c661b7ea5451c02a5ba5f66fcfd5c3268c8cb9416a09f48fa60eabb5d07931c24414031c7198f0826c0223f5deb2bb7cc262bef881c35fb91287f9e26706fb861f8a448f17fccfa642f9f9e5b15b6fddd5e02677f6f479725bb5ee76ae657e3d7e6d311e4dec62f9c3ddc560ab6ebd27e23f33646bc01eaf5970549946091a4a38aa4ab746c670379340a350af2b3152b19f39ec1cdb62cc298a0f2f21bed2f335c22d8f93099291673391c937da0e781b8b9b74f3d4f608029368c4c80073ef91fbc3df420b2632f69940e272639fbf95e11dc7bb29d0d1e20d2f430b02354992e7cae372574bc64474f2ad89dba5689ae3a38fdb2ba3518a125b70ce2257c1af923e5150217db455684f61e54abaf41a601d968f3c5b19ee4b24c0750464cd4f5f1bd6253c21cd2c993689c851ecb32672277bd4e61df8ccfc351a84bdbed099f4ca32264b0c108c6bd5d12706beb50dc1fa458a35859617da59eb0a12275b837e4b83b52281c69b57cc451949ae13137cff3aa64add23b378bc936f131791da17b73de617e642b85db13efd16231b728d6ec8dc1b9e03832fa7cfbd055631572686cdc861b5498319ff340153318b6e4b76e760ddb3ee9921841dee2000b9320244eec38ed91baede6db858f83e128f8ce05d0877107a0d062a3dd2daf74acf9340723e2bb3196528550576b388e62a7b8618e24ff18687b79fe28f84d1e7db89117dcf074faa30e666e7dab50d64d72e18bb20425e0fb09813b47b6edbbbc6acfa893f6091e0c2435229f17f4e114507bf8a49328e13ac5d0052f96e66dbd0fc133dd34731678a8f78dfeb9a27f12bbd5ba7a56048ed49165393a00bdf8517c4ac4f964b5fe03c0d4928c1ce39b4e73dbfb58da9b128d4470d9cbe4b0cf228179971d396cd4926d66d9a462b90d9f39910390045d1f8cab2401945f99c43a5b61d86c4acc2e1fc7d14592b2de32c127e9d7dc241d310ff718fae998091b0f9a06ac4d3c2d677cb5e81308bac48e3f86567afaee23e328b0277b3c1724376bdd943272378aea4bab056d969042da9ea087f5c4ea0f8dda4745876c448a6bea9580a192175e059b91880d7bd9efcec7377fe0552c510513d98ab2fe84ea59f5f9b0e5bc7477554a8f07b86181b2e719ce373b5b2103174edf2865e2c27c8e0f90feb32e194f8d2879f0b892e9fd600be748cee697799bc79e6ff4701435bd784690eabc822149e56987838de5a00f9e5355b3b8bf2654e2b61cdbf2c269c88130313e5f2ae77ddc10ad0d6edabfe33654f936d58f08f99465bf0f15705fb2acdbecb37840d565e63a084672003afaa05a0fba7bb4943d9bb55691f6c528867ab5d02539f44076f67cbb7a9f74893a52df9db100eb1e689ef87f1f043a23e22fab0a34dc69525f7903d4175cae58eb6032ba12043c17c32d3628014dfc03685cf71d647be03ea7bf6a4a95acaf6d3150a1f3f6af7d463797a3d356ff8bd572fefb765c1942ce0be2fab5004282660342b40f816d2d8c2825bd32e4e601066fd04dc56b2e16629979d43f8fc11b50df35c7f27ce81d31b7f8a27829a0dff87b18ad0f25bf5b821c9a3dfcedafc0fa733069c252fee2732c437694df3a7ba15c6a6e0be9b9c1dd228917e8bbf3e7b38e190d28d5d1880c2243bc15dca445486cf30788d67b589571928bf3adc8c7ff626e729657097cdfa9f74b7332573ff88c76fb1ef92f31b2a80e7057e2beea50670a46b138ffd506cdcb6756875f4043bbbbdc66aaea7dbfb0c605d22381cd47b32bc0be9a392978defa9d156866f6628336c21b166cd06a378afe8bbab41c3ed48036dee99899113e9ed855242da5ca6cdb575e4132dcd4c2ed7fb6ec11c40a04f94566613a4d25e6cc1a75e12776b9c1d0e6f681c8f817d7d33b1ad98528eb951068339a452d943cd0cf6babc44b874b74b67994943612cd4980bfe3f390aecfa2988d5442005095e624f0eb628a1ae07ce14f8ed76637cdab5b2f0650fd52bb2aa199571abce92c01a18dcb8e6075c31f17b056ff2105349c3464b8c6a1a544543bc66f6de4e46d10028063c20e7567a90f5d52e93ab6b5037ecf0128073f96efccbec7a84586956e1b4c4ab518a2d1a73b851053e742e2ee7874b5621f338a00b5033c39f36744167514f793d17fe49f087426db0e9f6f18f2e39768a1e112dd368c86daf11e05ecd190827feca2a98a605c08ddd90007bb5a42f4a8b6e01d4c69185f2c414573bb6c9ecb1635a629bff37a42da9c9c9efa9031d28f70521a049b090abde0bb350dfb3c68c58881388c2dccbf7a83d543971b55084b218cd7ed78ad1901ea6daa712ce7af6fd9039dcb28e4a697001c43909b35337dd88d6d947c72bcac538e6d7ade300507575d32f8f00cb77d7d5652f031315ee6ef4fab8b1194986420d90dd7145e1598cf1ccdf1536175caeff17e9b0ce02034bc71b5c17b625c456c570a2ba84e097cc963a9f4ebb6689985780fbd46d7402268a6cbdec0115698600996af044518faaa7c2681898b7e84df7509d01a22ddbf9333ee57356f8d93bab886aa9c353ac7512e581dfc3fbbb89da91c7644b44f6cd043ace04b994bede4a6db7f11e1a234ec629be9a313f2dcebf21b798d8010886df8d1ea6e9db36c537b873c100898c8f20398ec1fa165db1818463399b5f084f45d117f6b1765489bc2741bfc3f82be059e683f3bb9dff5e6ad5b1a2808f97369ee0ce3219a2ef3ccf6d86e068c5cba27aa6e449b0e4ba4b42b519895a7c53df2fc7dab3c9a51e501aa27226bdcf5aa6e2ab451f4a628de86fe128e96f841a6378ecf568eb7a3862b75e7a38bf842ba5facfea700fa39b28d2a02654aaeaef6df848e4b8e42c12572a179b14b1255a0a82bc5d39f270077ada4a5cb03bd1bcaaffec06257f8e963693c850c508de4dc34fadcfdb48858b85a6fcbf5699d5d3206f81e24ccc3e7f14f230737c28f79681fa1eae8656bfd3330d78543e3c743b178666340fcef4de6342018809e7523e2084287da6e9568c20bb2848a1fa7714aaa14e0df78a68c66f92e0527c41c35dd279de771cb73e53e58938dde6ee0d8399e22dac1479ad6214b5a68c7a8f32f2f29939e006d6464bb805bf1789fd91bdd0c41aef95d95bc2c6ff9395cd4fe7d4dcf2b889b77ec04e5ca554142777428273746182d0f1db8034c216f4f6646682aa9d559e83b355eb3927f1682d8cf662b47bd417b29bda69d40eaa4d0a55fb5f654127d7e5845b04e7bc5a1bae299f934e043a6d778278b3150ab8bba291945dad76de023c3cdc3d954e7c791ec70b2a15deacc485010cdb51f649b7443731a2695a0ecf9eb355d6d694ee05e0f02b1d20edb80baf9cbf46d3cc77689990cc1ee2d9ef7fccc7b641d5b3e0022b36c34c715f6a9bd49ec29137a826d20bf4a7ec2790222dd0f246f1a00059449ec03890620c48e331b1751d9d524129fb00125c49c3a1c8de54a67b21356d3e647c97b8d17fb8e0c9e10d0c8271788017138921dd0a53dceaab370d434b62cd302c58371aad0aae3a2dd3490a83e613d720a223dc59f7553d6ef13aeb0974b97485fb9c208b6c87b826a291bba6aed1d0f35799dc5a601dc7965625ac8a2833a886a8db8f2c1bdba08aa3ab1f892e80d97e834676fa495ab8d9106023f633a12b27acf8d69a6c46eeb7753ef5f4c9b439a3f3b124e4c91dd4299c34aef11c9d622e279f9ab23ec7b4cbc5ac00ee2f02b7064b359fdc4bf1fd20a43a201d2927a46a4c771dcfe014fe5b5dedd59e04a50a0984869b1f2e46e45a2a483834677d6be1c8c75ca8726ff90e725ae4d173d66c9557b98b81bacf39f084a82a15a67f666f3b29e3b0f7b096d3330abe22bd7626b7bab83dfafd5eca206d2dc8abb9197a8e2734c22b174a665272a69f249dde0ff48a2ab1f92526657980b8d34261cd02e5a43c0609060bceebd005ef9195ef48a778ed355a6b725efe715b977abe37cf61b0285ef749f5f723581d254020f6838f5a84ce47b6d25961d8ff50739d56f71b01f6bad77c194b945a44233aeb290591a956962b38f0fa43a3ae66e65cf6412f05a72df9fb7bb9ae927143583f26f35e8e8de1c28a244b0fcfac695b09de2b569a9a39da4ac27476d4b945d8d9cbb938c8f9eefcd11c51da99f33c5117226d15349a6548e4b447f1367c3e81ebacb49d8332226a7810224ee549eed2d754c697b277a6438c6a6bf9365875a17e3f0f328e1e03d32fc4784c1508bd9e24e8adea032b17a796d2fd8cb2a5", 0x1000}, {&(0x7f0000005800)="c50e227b4ec4e559e83dad4313a7f9683b9f4785ec37f9dc56d8db971e0a156b5ccd1442eeffa7d1e4607567f13a5dcffa6be05f496dee3b35546c0bf4cc10fbd64b59838d32b1d333a12f309c68870d5022dbc77532d8f5f1002dabe383378675769a3fdd4fb12dba883cce454e98f35faf002dc9e102b3f0169cd55e", 0x7d}, {&(0x7f0000005880)="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", 0x1000}, {&(0x7f0000006880)="f262d54380f7d847637be188ee22a9e3bcbb2d993fbdfd3956d6e5b705110ba8276ef38b3f0b80463130cb43112fa3f34fb9ef40b165060ce7893c887c4e7ed98fdcd9bf14c0f60dd37de4aedd019044cc6ce1d293a96f2fdcea0c6bbd9cf211b44983fee046e87943cdfcfd0213545c98bed86c38173ecbcb7f3c1f14", 0x7d}], 0x8}}], 0x5, 0x4081) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:14 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:14 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2458.958792] audit: type=1400 audit(1575075435.584:494): avc: denied { dac_override } for pid=1727 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:15 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0xc00, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80400400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0xac, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x57010236}}, ["", "", "", "", "", "", ""]}, 0x2bb}, 0x1, 0x0, 0x0, 0x20000010}, 0x4) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e22, @empty}, {0x2, 0x4e23, @remote}, 0x8, 0x0, 0x0, 0x0, 0x54, &(0x7f0000000140)='nlmon0\x00', 0x56f1, 0x0, 0x1}) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:58:15 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:15 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:58:15 executing program 3: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) fstat(r1, &(0x7f00000016c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r3) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={r5, 0x0, 0x2, 0x1ff, 0x4}) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) 00:58:15 executing program 0: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000080)={0x81, 0x20, 0x401, 0x400, 0x8}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$char_usb(r3, &(0x7f0000000180)="6646c04865ad731a16b3f5d775f686b74b87a09c650260903e9f712e18d6928b23f3122c609ca760eea6d8d509841eaa0e44f1a3175f06689adee74e8c49138b63d90a51161838c3e7fa815aa1ad31b55bd2370f91df3b3ff5a757715cc6e83995c63b6ce769d51ca4b6333fabd34469c710acf1faffb045f3bc42d6b3ff9b90d63912857b7f32e8df9f591372c3be0d8f655cdad346235867bae4fe2dcacbc350efc5af53fd1bf6f9739adc7196093a04cd2fb15e579d6d4887f4a9450f066b24228b45dfb1f3dfc552db9664ae83afb542510d60890e34a281de4c", 0xdc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2463.194612] audit_printk_skb: 96 callbacks suppressed [ 2463.194624] audit: type=1400 audit(1575075439.814:527): avc: denied { dac_override } for pid=1909 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:16 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000001cb2ed570003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x2) write(r1, &(0x7f00000002c0)="b4839322343d3de012b1fd111e1872cad80dd6b9c62f4634023f007483339abd8603c508650ac1b9f9c272344bae5e9372555849e2e4ec11026cf83bedc636ae5ca8354aca00139a7a75047225e83efc5cedd307e3735dcccba72eec400b9facc707025e0813f8d342ac07ec35f6c46a95b917a5247705250d2dcf6c532e948ff1851a9b7c13d7e8536c6e99863c89931ee3ee2b9b9dd9a475894ef7182fd0f9b180a18b989a608a70f77733", 0xac) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r2 = request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000240)='$.6/%cpuset]\x00', 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000180)="df166da536fae983218b8e1b9bfcbfce6bcacb15998bf0854e0662fd91e8081ff36f9a637ff7d48413eab8803668d29f086dd89c32ec4cce9c62754b8786c91e653f3f7c727e7f80217c1e801ff708420241d690185f0ba01fe8a0c4f0dff713d1c40c7d95a1ef1c3cf9a8583f99860895eaf23c7cd7937549411dfa84f9cd7fa29692641957b13189e8e40a51154258f74a35884d8fcef13020c7bf1389e62455", 0xa1, r2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:16 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:58:17 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:17 executing program 0: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = socket$inet(0x2, 0x803, 0x3f) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @loopback}, &(0x7f00000004c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = dup(r6) write$cgroup_type(r7, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) accept4$packet(r7, &(0x7f0000001e00)={0x11, 0x0, 0x0}, &(0x7f0000001e40)=0x14, 0x800) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000004240)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000004340)=0xe8) r12 = socket(0x10, 0x3, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r16}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r16, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r16}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmmsg$inet(r1, &(0x7f0000006980)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000080)="09e8383e71af005ca7b9cffa2cd721be5302af8d30b988e0a2eaba8274d5cd01bbbdea7043cf52c87a3d6570f9b921d11ee8823188cce8ba6bdf450222fccaa6834ae91355ef57", 0x47}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000000180)="04ce82a908ed9f048b81231ec6d084e3fb3fe4f251adc4a860a9e29bb7e63628900cb342d595cbff8143237d869d648f5f1f3ae599a7c30761ac493d15c902bac95023f11a6db9ec074180", 0x4b}, {&(0x7f0000000100)="4129b23d4071234563298c67fee846a9dbc8d4a4bb3b6d315428e6589c8bbbb36c1aa441bc0874f76e6ee55323c4a7a092742f0810", 0x35}, {&(0x7f0000000200)="6ed0f8db22f3d8a6c5605490e39efdd0050638829f74a0543c440134f5537485b7659f260dc8dd93f2f17dd364664c6d3736fe56f1b93b1f7c9a6a592f157709c01dfafb9d0d1324042b13b3b80eacf52f2233ab28de806668e6bb1a399dda54fd1818d910cbf7cde2ef9f327f6411f49c3a291ecf2e167cbe3c8485e71252c953699d3639518045147f540e6d18a4ea75f62a1b136db9f17742f15820bd86bfd35f7a0e2f00d2bdac523213d9b58c", 0xaf}, {&(0x7f00000002c0)="2e92ea1c84f93601c6d2c38e790961c363", 0x11}, {&(0x7f0000000300)="f72b4e3deb7c2b8c49d4bcd3f039a5d48c4083b29479a20b6b76aaa5ac651e8c353c2f63db3f3414e6e1983f320fec83c4fcb5d67c881700cbc0bafc25a2244b", 0x40}], 0x7, &(0x7f0000000700)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9816}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0xe8}}, {{&(0x7f0000000800)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000001d80)=[{&(0x7f0000000840)="88420c2dbe738bd1a3027ce45b26b8fb4c4bf634c9d18a253d44e218a2503bb2ad386311c3da1a2d9cae6fbd977ca642c9743a8e9f2454ac3c1c4ccc12578dde46b874db8042e4af4ddb4b9daa449fda4a64836004602ff42f13f3e976d6095ee09b04d33621811a7738fdb53646f2ed9c20911b9524345a816ae6f3e41bd10c7b6a92e8c16920279a508eef1570496879d2b5e2e248ce26db680b06c9f72897b32426990ab463c460175829b61b70c78a2ef42507a17489e405f06fff3d98e874afa20369450955929065556761fd7f6b68b5c383aefecdb69adf2296212960fc4b3d7961a75fad743ee00ef98fb62e2d3870c65564f1", 0xf7}, {&(0x7f0000000940)="e4982a3b041f0c9c3f54d7db35bc9f1c952649e85ec4954abf96f92c3440118b82f65c47ad5a54a0a1d81a1fb6df518e006fbc40e7df92a364ba2478ab2a35a39300cae278643fe9a8e660e30bd84485b70f46a6a7206c279cea47915c78380e23089e40f7fbd4ccda3783388da9c62e", 0x70}, {&(0x7f0000001a00)="802a1db1f7290851f3120bc9008aae4777a399f591752b646551318a3b528625ac0882ce392bca4eabf460751beb357d03ad5f1e36f4f48b725c052f592eec0da1c92e5aa6b35a0aa8cfaba113570a6e78b571a78f014637901e9ee855b2b0267a0dd25bd7d69d7c96", 0x69}, {&(0x7f0000001a80)="f51d0b85ba37502beb8c38cf8433258afa25e03fc0400a2bee98e709ca6124c3578ae3603aecbe2c326058113f8e4b5a68b7cf43e30c4ee00e123d6a520d49ec67cfad4c48fb8840928e10efc25bc37a6933850e597c36c6873fb49e5961eb6bf6063688b61e746ab8c0a52dc44cfbc9349fd287d43cc6a95f5f7f1d37316afcd4721b25389d2f6278545b5dd263007bb5f37e2f563b43", 0x97}, {&(0x7f0000001b40)="a3", 0x1}, {&(0x7f0000001b80)="cbeea8462e1ea532d7551408ece36b20aeb939bd212aedba6c0e3020154fb9128e4dd70764ddb38b4e3a4314ac0c335a423bc1b9967a1cddf7c3a196f955ba678c182242a5c31700aac95f79ea7c8cc346e49ec88d516165529238ab976a", 0x5e}, {&(0x7f0000001c00)="08ce4897ccf887883cedbf98079dbd2d6125e5327cce23b023e0cd6f819daa0e8e9500eed86758f32f5288a39b6c8ec13b1b8041fed00276ed215767fa85c973504bd8b60cdccb80fd83127c8374a7a0da51bd360f49c867f1f55512beed90125d5a8ccaa637b978810301a15cfe07d6294c04ffc63ee44cacdb7e160a1e94a66badcdc90d8bf44962e9b4375a53f4d08791fabc0383fc3379220e4e87921374", 0xa0}, {&(0x7f0000001cc0)="4fc5dcb190e4e8a21cc3bfeeaf5aee18026e0685c47bbacf2d658e9655524d398804a352fa56b71680f95b92561305e74d0a84d4f775d72e5c3d69ab93505eca57d67118b1c49ed91a32e3642dbaa4f0ac25ed34b2a1f268cadd8e978d476e4d0f05f4fb5be4086310fcbc9d75db5a546e43d47a56c268b80e43fbfd33494d5b6236292e41e618d558e1dda2d968bd820e90a195b399e3ac924c6a182fd49326efb9b442a906ef678ff71923", 0xac}], 0x8, &(0x7f0000001e80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0xee0e}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@generic={0x4, 0x2}, @end, @generic={0x11b, 0x6, "0c348f55"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x53d}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast1, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}], 0xa0}}, {{&(0x7f0000001f40)={0x2, 0x4e23, @rand_addr=0x3}, 0x10, &(0x7f0000002f80)=[{&(0x7f0000001f80)="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", 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f0000002fc0)="7a7d8716a4b1d51664f56895ab29132f45f0425875a010a6dfe235f52c366c73167e670cb744df0a3200477b424bf32818b8e0bbc1ba120d99dba779ded2a76cf0f1aa5577435a461c2b492b6bd3bbab3ae2d9f511a0484858dfb8e5ff64b70445a10a5732ce16ee4db095a4d39704fdfd5e495282184fa1bae1bb6bf2117c5f6f91935b3c448720ab3c366440c77fc2cb61b6123e804cbab87766cc473523df11823627a91c9cd92c644de6bf956e38", 0xb0}, {&(0x7f0000003080)="9f989dbd5913e8d94f9f9f079038443caefabb9f26708a9f5dc2dcaf2d6f63c60f0a06cc8fc24a4175e7047fb5e47aba176ede4d417625cbe886a41008358062b922b8b73e7b8a2e9849ddd4ef4cc632863f8e5dd38a50e0a9e31731eb13b80bc743640ac4d6942c96ea61ca8c8004ef048a1fc3b9363b9395fbbfea0533b70124617596d15ecaa1377187ac73f9fc2cedc361f9bba0e1f575f5977ee1ef0d954ff8b8bf77da3c58ec177b1c16046bac1ff3b6d5cdc42cf80a1c14a9", 0xbc}, {&(0x7f0000003140)="102d938bc57ecfdacabf543142b08451fbede09ea9d5457e23e847c94e475e13aa128829907c8ea5f76c3419be006b95da4e47eec8ea32a635f9275b07283d00c67105296879ccc0a149060b6e48cb0645fea9f941707c36172c596a82a7f598ab236feeb70d3ecf30a22cabec967682af09b99533a525f06b59c13209e962dbcd6b7b1ba21e55d377f4c18716f3382fb02497b073f479ef37929536f6797142fb062cb82f6b282add27650b17c61d3a05383a139c9f16e2ef9740addd582b", 0xbf}, {&(0x7f0000003200)="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", 0x1000}], 0x4, &(0x7f0000004380)=ANY=[@ANYBLOB="14000000000000000000000001000000030000000000000058000000000000000000000007000000890f3fe0000001ffffffffe0000002071707e0000001ac14142b0000000000000100ac1414bb891ff7000000007f00000100010001ac1414bbac1414bb00000000ac1414120000001400000000000000000000000100000000000000000000001c000000000000000000000008000000", @ANYRES32=r11, @ANYBLOB="7f000001ac1414aa0000000014000000000000000000000002000000070000000000000014000000000000000000000001000000f9ffffff000000001c000000000000000000000008000000", @ANYRES32=r16, @ANYBLOB], 0xf8}}, {{&(0x7f0000004480)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000006900)=[{&(0x7f00000044c0)="c588687e754cbabf720db4c446af33002a93fcb4e17f4e59d5945ebebf42c41788050e35ef62b757ee4054524ba44641928fa9275236dcfbdbb659598091b3f4d10d7691da0163b7034099f8b501e63d36d3e84f62a7ee0e8e57f4e39b098ea4b47c8d1d28f649dd97d8aa95a7c7528c81564ba1ed22fb88024edf115e2496698271f31754439848a88aa572b454cb633b4a7b85d0f7a2cc3beec2d180a899602fc14bc38ffba2adfa3cde9807b4f46ef023891ba83b9fac724502b24d7882f3917967e2a7e46f071934b8c53a298c123a6bf9244c421188a0d4ff2735527e917b60ea0c3ec229933675d1b7e9dc2f489be53647198f51b0", 0xf8}, {&(0x7f00000045c0)="7656dc5c864f0ca9b3ed3913b35cfca8f0ea52d61b584a837841f9e66d92b9b4a258e12fa83d5626ffc487d3229c68f9b037ddec3946bd347ef9d7d4e02f5eda406fdfe19f48d215d05069368efd36fe584d773fe85c7322167143cadc6df8caae71a1a7af0b9e7115facb5245b6754eb7681956e9436e1fac2743bd00096bcebef58c3744a486ced0cf221a", 0x8c}, {&(0x7f0000004680)="514c8111c4b73defbf853e3ec225c2300567d2c3f1f6782fb596cf34b4ae496540dc2f7b3eded2144b1f1f8da9a5e08147659607f49afde6e12ef8b47c5b2ebfc2c19ab118e9b50f10666d48163645a8e0740b00d07d2a6b6a7f78bf6a4029fd50dfb28883892b71d94782e9fa7957277a10c134be2020e5215046749b18d06bc0bdd9f9e623d45073012c7def4ddaad6ee25b9b8f3637cc2ca7353f71962241ceecb5d6854c39acfcdcfe1e9a969f7006b3f123830f39c172845eabfe6c0541c7c2e7a9759ec2ae24b5f599756f7b48ee13853e", 0xd4}, {&(0x7f0000004780)="c4f198632b023cea22bc105ea5a2d14208535295492527da14340efa2d31dfee52a30e0fdf9bac415dbe1a633ccecad44eae2106ac1ef5afa42ed1de340695c4b3819a87a2f6c5655b29ba69b90127c9607f173ebd4242053d48dbe5be1ff25b5f327415686a407d8a17ee2ce89475f0", 0x70}, {&(0x7f0000004800)="50f43d7eaa0dd021e5301a9a5aa92764aa0591bfc1eb1a95c9d7640cc7a5f03b771b8ca52eeccfd1884ce9b34a763469422497f4b536c081c4b6a3af43a900ca8be6210e5ed31e0d365ced789d3b331be59c8409829273a80ce7aecaa231f178ea46c8116a2269033e336701ac23b83b9e28b2d00b7027ef8f216c1ef470088b14b05b02b992b71d9f442fc5ab6c6211ef084dd16b2338d8655b59c74ff43c33924a9994f69ec415f28e4ddf28690717d9686bc190d3c46cebe766789c23d09de6e4c0ca0a1c9e2df945db169dea1efe8a3c3b1b2caefc7b491e1d6209e7caf2dd527e63be300a9b5c11690cc63b7579e39003f9b854f5b0f53ca863617a0c5ab8d26874ab4b490d7b642d38fcbf1a56f16aed8853fb595132aae7578a1a2f66a26c2b53efc753ed59bacedc3c7d3bc06f2bc9d60a6fc8fe4cc62bbbc7969553f6ebc97776fd9b5789b850a09525d8f97f08414fcd2194b8bf4e45a287ada2a064fbd2c9b262077fa8dd65d8350db069385487f10ebb011c8bc2bd9372856b3b2599a109f88680e9244e418c0316c04f00afc92c6e7a509117856703151e6d8f8edf56277fda069474f49291947c9b727203e0bbd6c48a79eb77da878b2545063674ff0a329787b6906ef6a0390ea72f48e450c60cd1df86d76fe39ec5c1a0139700abb6641ac282b9b8238d27fa802d1ee08f69857b406940ffe3ab15198e0bc208b8dd0dec63f0de261b97b604891c3a537eaad16a66ad494a2e0187aae021030f609d2c81cd38863940ac0b0bb4b608993291af1982bda65ae2983dbb94797db26dcf13534baebc6cb9861afa0baabc612c46028eebc7401d2e41ea1df429eebc86eb5c9e427ae9dae99f4caf114ca6f5ba94b4ccf8d0570ce92d7d26482785c5fab6ddde8c896874750809a6efad5fbc8e573fb808449fc7fe853604e04c3521bd27ff8d8886ed04fe043f483a522b12e8d8b9f382127c22bf35c385f485b83a144bdd3fc8c9ad537886ab4460e32ee8440b7b598716d8fc8deb104299bbdfa4e70a58c3ef7eca06348e0a28d28f1ce4d117d99cf227dd13807281632e1277b7748507499032f78ede0c151d3168732eca49b1d2584ed8449fb8ba87a26f00fa1e89c6709760f22560cbeca5a96a5d3e2b8c4c29fc1756a39b4994d6fe910987fcf1c1bab4dece0f67a8d3b335780a81ac2524090440ea64d01a002755c37d25d5d8924c9b672c6d562b000574e694db45d9e7b6f07525d13273b97b16b4b9d149aa5b07b9518b25e926aab9e6b8524f9b0525a5dcd94f932f3d9f9ffae59929340554db1091fdf06894ab0ffe5f5476708a48944647d532a786b1e1e89e4efedc9a3ac0722af0e1faf54273ef2dda402b2306df5c548b6ae6ea0c167f857dcff23d91fb42ab651a899001d191996ba8d15584a9550704310a4aad77b8606e720c51f2df31661c70a515ee1dd6a01658734a4992c37baad1166a325a2367dc7239fce13889e8bdcee4d8c661b7ea5451c02a5ba5f66fcfd5c3268c8cb9416a09f48fa60eabb5d07931c24414031c7198f0826c0223f5deb2bb7cc262bef881c35fb91287f9e26706fb861f8a448f17fccfa642f9f9e5b15b6fddd5e02677f6f479725bb5ee76ae657e3d7e6d311e4dec62f9c3ddc560ab6ebd27e23f33646bc01eaf5970549946091a4a38aa4ab746c670379340a350af2b3152b19f39ec1cdb62cc298a0f2f21bed2f335c22d8f93099291673391c937da0e781b8b9b74f3d4f608029368c4c80073ef91fbc3df420b2632f69940e272639fbf95e11dc7bb29d0d1e20d2f430b02354992e7cae372574bc64474f2ad89dba5689ae3a38fdb2ba3518a125b70ce2257c1af923e5150217db455684f61e54abaf41a601d968f3c5b19ee4b24c0750464cd4f5f1bd6253c21cd2c993689c851ecb32672277bd4e61df8ccfc351a84bdbed099f4ca32264b0c108c6bd5d12706beb50dc1fa458a35859617da59eb0a12275b837e4b83b52281c69b57cc451949ae13137cff3aa64add23b378bc936f131791da17b73de617e642b85db13efd16231b728d6ec8dc1b9e03832fa7cfbd055631572686cdc861b5498319ff340153318b6e4b76e760ddb3ee9921841dee2000b9320244eec38ed91baede6db858f83e128f8ce05d0877107a0d062a3dd2daf74acf9340723e2bb3196528550576b388e62a7b8618e24ff18687b79fe28f84d1e7db89117dcf074faa30e666e7dab50d64d72e18bb20425e0fb09813b47b6edbbbc6acfa893f6091e0c2435229f17f4e114507bf8a49328e13ac5d0052f96e66dbd0fc133dd34731678a8f78dfeb9a27f12bbd5ba7a56048ed49165393a00bdf8517c4ac4f964b5fe03c0d4928c1ce39b4e73dbfb58da9b128d4470d9cbe4b0cf228179971d396cd4926d66d9a462b90d9f39910390045d1f8cab2401945f99c43a5b61d86c4acc2e1fc7d14592b2de32c127e9d7dc241d310ff718fae998091b0f9a06ac4d3c2d677cb5e81308bac48e3f86567afaee23e328b0277b3c1724376bdd943272378aea4bab056d969042da9ea087f5c4ea0f8dda4745876c448a6bea9580a192175e059b91880d7bd9efcec7377fe0552c510513d98ab2fe84ea59f5f9b0e5bc7477554a8f07b86181b2e719ce373b5b2103174edf2865e2c27c8e0f90feb32e194f8d2879f0b892e9fd600be748cee697799bc79e6ff4701435bd784690eabc822149e56987838de5a00f9e5355b3b8bf2654e2b61cdbf2c269c88130313e5f2ae77ddc10ad0d6edabfe33654f936d58f08f99465bf0f15705fb2acdbecb37840d565e63a084672003afaa05a0fba7bb4943d9bb55691f6c528867ab5d02539f44076f67cbb7a9f74893a52df9db100eb1e689ef87f1f043a23e22fab0a34dc69525f7903d4175cae58eb6032ba12043c17c32d3628014dfc03685cf71d647be03ea7bf6a4a95acaf6d3150a1f3f6af7d463797a3d356ff8bd572fefb765c1942ce0be2fab5004282660342b40f816d2d8c2825bd32e4e601066fd04dc56b2e16629979d43f8fc11b50df35c7f27ce81d31b7f8a27829a0dff87b18ad0f25bf5b821c9a3dfcedafc0fa733069c252fee2732c437694df3a7ba15c6a6e0be9b9c1dd228917e8bbf3e7b38e190d28d5d1880c2243bc15dca445486cf30788d67b589571928bf3adc8c7ff626e729657097cdfa9f74b7332573ff88c76fb1ef92f31b2a80e7057e2beea50670a46b138ffd506cdcb6756875f4043bbbbdc66aaea7dbfb0c605d22381cd47b32bc0be9a392978defa9d156866f6628336c21b166cd06a378afe8bbab41c3ed48036dee99899113e9ed855242da5ca6cdb575e4132dcd4c2ed7fb6ec11c40a04f94566613a4d25e6cc1a75e12776b9c1d0e6f681c8f817d7d33b1ad98528eb951068339a452d943cd0cf6babc44b874b74b67994943612cd4980bfe3f390aecfa2988d5442005095e624f0eb628a1ae07ce14f8ed76637cdab5b2f0650fd52bb2aa199571abce92c01a18dcb8e6075c31f17b056ff2105349c3464b8c6a1a544543bc66f6de4e46d10028063c20e7567a90f5d52e93ab6b5037ecf0128073f96efccbec7a84586956e1b4c4ab518a2d1a73b851053e742e2ee7874b5621f338a00b5033c39f36744167514f793d17fe49f087426db0e9f6f18f2e39768a1e112dd368c86daf11e05ecd190827feca2a98a605c08ddd90007bb5a42f4a8b6e01d4c69185f2c414573bb6c9ecb1635a629bff37a42da9c9c9efa9031d28f70521a049b090abde0bb350dfb3c68c58881388c2dccbf7a83d543971b55084b218cd7ed78ad1901ea6daa712ce7af6fd9039dcb28e4a697001c43909b35337dd88d6d947c72bcac538e6d7ade300507575d32f8f00cb77d7d5652f031315ee6ef4fab8b1194986420d90dd7145e1598cf1ccdf1536175caeff17e9b0ce02034bc71b5c17b625c456c570a2ba84e097cc963a9f4ebb6689985780fbd46d7402268a6cbdec0115698600996af044518faaa7c2681898b7e84df7509d01a22ddbf9333ee57356f8d93bab886aa9c353ac7512e581dfc3fbbb89da91c7644b44f6cd043ace04b994bede4a6db7f11e1a234ec629be9a313f2dcebf21b798d8010886df8d1ea6e9db36c537b873c100898c8f20398ec1fa165db1818463399b5f084f45d117f6b1765489bc2741bfc3f82be059e683f3bb9dff5e6ad5b1a2808f97369ee0ce3219a2ef3ccf6d86e068c5cba27aa6e449b0e4ba4b42b519895a7c53df2fc7dab3c9a51e501aa27226bdcf5aa6e2ab451f4a628de86fe128e96f841a6378ecf568eb7a3862b75e7a38bf842ba5facfea700fa39b28d2a02654aaeaef6df848e4b8e42c12572a179b14b1255a0a82bc5d39f270077ada4a5cb03bd1bcaaffec06257f8e963693c850c508de4dc34fadcfdb48858b85a6fcbf5699d5d3206f81e24ccc3e7f14f230737c28f79681fa1eae8656bfd3330d78543e3c743b178666340fcef4de6342018809e7523e2084287da6e9568c20bb2848a1fa7714aaa14e0df78a68c66f92e0527c41c35dd279de771cb73e53e58938dde6ee0d8399e22dac1479ad6214b5a68c7a8f32f2f29939e006d6464bb805bf1789fd91bdd0c41aef95d95bc2c6ff9395cd4fe7d4dcf2b889b77ec04e5ca554142777428273746182d0f1db8034c216f4f6646682aa9d559e83b355eb3927f1682d8cf662b47bd417b29bda69d40eaa4d0a55fb5f654127d7e5845b04e7bc5a1bae299f934e043a6d778278b3150ab8bba291945dad76de023c3cdc3d954e7c791ec70b2a15deacc485010cdb51f649b7443731a2695a0ecf9eb355d6d694ee05e0f02b1d20edb80baf9cbf46d3cc77689990cc1ee2d9ef7fccc7b641d5b3e0022b36c34c715f6a9bd49ec29137a826d20bf4a7ec2790222dd0f246f1a00059449ec03890620c48e331b1751d9d524129fb00125c49c3a1c8de54a67b21356d3e647c97b8d17fb8e0c9e10d0c8271788017138921dd0a53dceaab370d434b62cd302c58371aad0aae3a2dd3490a83e613d720a223dc59f7553d6ef13aeb0974b97485fb9c208b6c87b826a291bba6aed1d0f35799dc5a601dc7965625ac8a2833a886a8db8f2c1bdba08aa3ab1f892e80d97e834676fa495ab8d9106023f633a12b27acf8d69a6c46eeb7753ef5f4c9b439a3f3b124e4c91dd4299c34aef11c9d622e279f9ab23ec7b4cbc5ac00ee2f02b7064b359fdc4bf1fd20a43a201d2927a46a4c771dcfe014fe5b5dedd59e04a50a0984869b1f2e46e45a2a483834677d6be1c8c75ca8726ff90e725ae4d173d66c9557b98b81bacf39f084a82a15a67f666f3b29e3b0f7b096d3330abe22bd7626b7bab83dfafd5eca206d2dc8abb9197a8e2734c22b174a665272a69f249dde0ff48a2ab1f92526657980b8d34261cd02e5a43c0609060bceebd005ef9195ef48a778ed355a6b725efe715b977abe37cf61b0285ef749f5f723581d254020f6838f5a84ce47b6d25961d8ff50739d56f71b01f6bad77c194b945a44233aeb290591a956962b38f0fa43a3ae66e65cf6412f05a72df9fb7bb9ae927143583f26f35e8e8de1c28a244b0fcfac695b09de2b569a9a39da4ac27476d4b945d8d9cbb938c8f9eefcd11c51da99f33c5117226d15349a6548e4b447f1367c3e81ebacb49d8332226a7810224ee549eed2d754c697b277a6438c6a6bf9365875a17e3f0f328e1e03d32fc4784c1508bd9e24e8adea032b17a796d2fd8cb2a5", 0x1000}, {&(0x7f0000005800)="c50e227b4ec4e559e83dad4313a7f9683b9f4785ec37f9dc56d8db971e0a156b5ccd1442eeffa7d1e4607567f13a5dcffa6be05f496dee3b35546c0bf4cc10fbd64b59838d32b1d333a12f309c68870d5022dbc77532d8f5f1002dabe383378675769a3fdd4fb12dba883cce454e98f35faf002dc9e102b3f0169cd55e", 0x7d}, {&(0x7f0000005880)="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", 0x1000}, {&(0x7f0000006880)="f262d54380f7d847637be188ee22a9e3bcbb2d993fbdfd3956d6e5b705110ba8276ef38b3f0b80463130cb43112fa3f34fb9ef40b165060ce7893c887c4e7ed98fdcd9bf14c0f60dd37de4aedd019044cc6ce1d293a96f2fdcea0c6bbd9cf211b44983fee046e87943cdfcfd0213545c98bed86c38173ecbcb7f3c1f14", 0x7d}], 0x8}}], 0x5, 0x4081) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:17 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000200)='$.6/%cpuset]\x00V/7q\x80\x8f\r^\xee\v\xd1\xaa\x9c\xf1+\xfb\xed\xc3\x15Kb\xb2E\x0e\xe9\x8a\xb4\x19\x8d\x1d\xfe\x8f2\xe2\xc4\x11~\xc6l\xf7\xc6\x7f\x81U\x11\x00\x83\xeb\x9a\x05\xd0\x16\xde\t\xf9M0\xff\x10\xf9\xf3\xd6\x96~A\xdb_\xb5\xd4\xc6\x1c4\x9a[C8\rI!\x9e\x03+_ 6\x99\xc3\x82\xb5\x9d\xcb\xa8\xf7\x82\x92\xa1\x8eU\a\xa6\xcf\xa7\xa9\xc2#1Q\xa2mv\x14\xcf\x8dN \aY{\xe5\xbe\xceJ\xa6\xe09\xbd\xef\x113\xd2Y\x01\x1b\x85\xa9\xd8]\x92\xf8\xe0\xa5\xe46bU\xc4E\x82\\\x9d\x01\x92\xf9\xa5\xa1\x81\r?|\xa3i\xa1`P\xa9\x11\x05\xd5JC|\"\x19m\x97\xaej)IeRW\x01\xb4\x17C\x8dQ', 0x2) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[], 0x4b) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[], 0xc2) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) execveat(r3, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:17 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2463.196444] audit: type=1400 audit(1575075439.824:528): avc: denied { net_admin } for pid=1909 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:18 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:58:19 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2463.215995] audit: type=1400 audit(1575075439.844:529): avc: denied { net_raw } for pid=1909 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:19 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r2 = gettid() tkill(r2, 0x10010000000032) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r2], 0x12) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1000) r3 = dup(r1) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) socketpair(0xe, 0x2, 0x8, &(0x7f0000000200)) write$FUSE_STATFS(r3, &(0x7f0000000040)={0x1bcf535fd8209dec, 0x0, 0x4, {{0x8000000000ed7f, 0x10001, 0xa85e, 0x3ff, 0x101, 0x300000, 0xc72e, 0x4}}}, 0x60) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = gettid() tkill(r4, 0x10010000000032) ptrace$getenv(0x4201, r4, 0x8, &(0x7f0000000100)) 00:58:20 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:20 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b00003001e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$P9_RLERRORu(r2, &(0x7f0000000040)={0x19, 0x7, 0x1, {{0xc, '@em0security'}, 0x800}}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:20 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r2 = gettid() tkill(r2, 0x10010000000032) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r2], 0x12) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1000) r3 = dup(r1) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) socketpair(0xe, 0x2, 0x8, &(0x7f0000000200)) write$FUSE_STATFS(r3, &(0x7f0000000040)={0x1bcf535fd8209dec, 0x0, 0x4, {{0x8000000000ed7f, 0x10001, 0xa85e, 0x3ff, 0x101, 0x300000, 0xc72e, 0x4}}}, 0x60) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = gettid() tkill(r4, 0x10010000000032) ptrace$getenv(0x4201, r4, 0x8, &(0x7f0000000100)) [ 2463.337639] audit: type=1400 audit(1575075439.964:530): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:21 executing program 1: r0 = memfd_create(&(0x7f0000000100)='ppp1em1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x10, "a9c5460cc99b0ee9adf0f031749c2389"}, &(0x7f00000000c0)=0x34) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:21 executing program 5: mkdir(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = memfd_create(&(0x7f0000000140)='(', 0x1) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYRESHEX], 0x12) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:58:21 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) [ 2463.454234] audit: type=1400 audit(1575075440.074:531): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:22 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:22 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) write$selinux_user(r1, &(0x7f0000000180)={'system_u:object_r:tty_device_t:s0', 0x20, 'sysadm_u\x00'}, 0xffffff6c) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xa) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:22 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:22 executing program 5: mkdir(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = memfd_create(&(0x7f0000000140)='(', 0x1) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYRESHEX], 0x12) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2463.488879] audit: type=1400 audit(1575075440.114:532): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:23 executing program 5: mkdir(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = memfd_create(&(0x7f0000000140)='(', 0x1) write$binfmt_elf64(r1, &(0x7f00000009c0)=ANY=[@ANYRESHEX], 0x12) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:58:23 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="01a370ebb37f454c46020000000000000000c4b40021003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000040)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:23 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:24 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = gettid() tkill(r1, 0x10010000000032) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x17) execveat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1400) memfd_create(0x0, 0x2) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000), 0x10) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:24 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:24 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2463.885810] audit: type=1400 audit(1575075440.514:533): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:24 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = gettid() tkill(r1, 0x10010000000032) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x17) execveat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1400) memfd_create(0x0, 0x2) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000), 0x10) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:25 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:25 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = gettid() tkill(r1, 0x10010000000032) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x17) execveat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1400) memfd_create(0x0, 0x2) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000), 0x10) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:25 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:25 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) 00:58:25 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:25 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) [ 2463.898723] audit: type=1400 audit(1575075440.524:534): avc: denied { dac_override } for pid=1904 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:26 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:26 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x4, 0x4f0, [0x20000180, 0x0, 0x0, 0x200001b0, 0x200002be], 0x0, 0xfffffffffffffffd, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x12, 0x1, 0x10, 'team_slave_0\x00', 'bridge0\x00', 'rose0\x00', 'hsr0\x00', @dev={[], 0x1b}, [0xff, 0x41d650b059fa856, 0x0, 0x7f], @remote, [0x0, 0x0, 0x80, 0x0, 0xde01f0e9bc2c8180], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2bbc232b4e98b5d4}, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{0x5, 0x20, 0x0, 'tunl0\x00', 'ip6_vti0\x00', 'veth0_to_bond\x00', 'bpq0\x00', @remote, [0x0, 0xff, 0x0, 0x0, 0x0, 0x7f], @local, [0x7f, 0x0, 0xff, 0x0, 0xff, 0xff], 0x9e, 0x9e, 0x116, [@m802_3={'802_3\x00', 0x8, {{0x8e, 0x5, 0xd}}}], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x5, 0xff, 0x1, 0x0, "80d499040366f4deaa4602310d9786aa656adc81b7ce91cb701c5137b642cd3d429f81c88a91255db6cb9903b9db51692cde8a2d9ef55513c5d077b24b7e96f2"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x11, 0x2, 0x1c, '\x00', 'yam0\x00', 'team_slave_1\x00', 'rose0\x00', @empty, [0xff, 0x7f, 0x0, 0x0, 0xff], @empty, [0x0, 0xff, 0x0, 0x0, 0x0, 0x47f680e2767c4063], 0x6e, 0xd6, 0x126, [], [@snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x7ff}}}], @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x40, 0x1}}}}, {0x3, 0x8, 0x88e7, 'bridge0\x00', 'bond0\x00', 'veth0\x00', 'veth1\x00', @dev={[], 0x15}, [0x80, 0x0, 0xa2d2dbf35e095cb2, 0x0, 0x1e406280f5b555e1], @remote, [0x0, 0x0, 0x0, 0x80, 0xff], 0xde, 0xde, 0x116, [@statistic={'statistic\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x8, 0x7}}}, @vlan={'vlan\x00', 0x8, {{0x2, 0x4, 0x88a8, 0x7, 0x3}}}], [], @snat={'snat\x00', 0x10, {{@remote, 0x10}}}}]}]}, 0x568) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:26 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:26 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0x12) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1a900, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x44) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x6fc) 00:58:27 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) [ 2464.024479] audit: type=1400 audit(1575075440.644:535): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:27 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:28 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:28 executing program 0: mkdir(0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x842, 0xcae0}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c465eba26020000000000000000c4af008a5f15333bc94fbc8b44164c42da0eb69d0908d92d8596f29fce52daeffa43d97978252b62205f33197b0689bb0ab68c4c042ae57f6c4f02de991656b0ade9358796f98965eb5bba370247596309fca9c0b0abc1457e9e22eaf20ab423e8253e25cb4657ef41279e957565a362d7a1b65a7cb2ca0a6bd9c4314d3a0d48caad3e032446bb315427cdf1a9f0ff990600"/187], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:58:28 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 00:58:28 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xe76878bd5aa2570b, 0x85) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r4, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket(0x18, 0x803, 0x0) fstat(r10, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000400)) r12 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r12, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r12, r12, &(0x7f00000000c0), 0xffffffff) execveat(r12, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r12) fsetxattr$system_posix_acl(r5, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r8, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r9, @ANYBLOB="1765a6449a8e5066cd1dad4d", @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) fchownat(r0, &(0x7f00000000c0)='./file0/file0\x00', r2, r11, 0x400) fchmodat(r0, &(0x7f0000000080)='./file0/file0\x00', 0xa) r13 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2) r14 = socket$netlink(0x10, 0x3, 0x0) writev(r14, &(0x7f0000fdbff8)=[{&(0x7f00000025c0)="290000002100190000003fffffffda260200000000e80001040000040d00140000000000132eb75c35", 0x40d}], 0x1) r15 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r14, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r15, 0xc, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xd, 0x8001, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_RESET_LINK_STATS(r13, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r15, @ANYBLOB="080026bd7000fedbdf2501000000000000000c4100000014001462726f6164636173742d6c696f6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0x400, 0x2, 0x8, 0x2579, 0x2, 0x4, 0x8}) [ 2464.263162] audit: type=1400 audit(1575075440.884:536): avc: denied { net_raw } for pid=1962 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:28 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:28 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:28 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = accept$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x381) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000100)={0x73e9, {{0xa, 0x4e21, 0x8, @local, 0x1}}, 0x1, 0x1, [{{0xa, 0x4e21, 0xfffffff8, @mcast1, 0x401}}]}, 0x110) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x5, 0x2, 0x3, 0x3, 0x8, 0x800}, 0x20) 00:58:29 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getpeername$unix(r2, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) fcntl$setstatus(r3, 0x4, 0x44800) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) io_submit(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f0000000180)="a7c69189a0060b9b260400ea5a83e5d7611b4fb33e357035f34f7738276689422edad35eef9313e390abc903bcb35e90d3850480339d2ca12345dbd76a17fb715b558bfd0e47dad6751fe225aa4c4e89dbee549f43af71ae46514872257f421c620345af6267871dbf3ca61cf8d96ea768e655746c3474cf2c7220cdaa98fd84b84dc995efec5460950aaeb4151f10af48ceb58c5a5e3e4b4bca23658d0cca32618bbe48fc", 0xa5, 0x3ff}]) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:29 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:29 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) [ 2465.934976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2068 comm=syz-executor.4 00:58:29 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = accept$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x381) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000100)={0x73e9, {{0xa, 0x4e21, 0x8, @local, 0x1}}, 0x1, 0x1, [{{0xa, 0x4e21, 0xfffffff8, @mcast1, 0x401}}]}, 0x110) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x5, 0x2, 0x3, 0x3, 0x8, 0x800}, 0x20) 00:58:30 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8}, &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/245, 0xf5}, {&(0x7f00000002c0)=""/102, 0x66}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000400)=""/169, 0xa9}, {&(0x7f00000004c0)=""/223, 0xdf}], 0x5, &(0x7f0000000640)=""/130, 0x82}, 0x6) [ 2468.384790] audit_printk_skb: 138 callbacks suppressed 00:58:30 executing program 3: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xe76878bd5aa2570b, 0x85) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r4, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket(0x18, 0x803, 0x0) fstat(r10, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000400)) r12 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r12, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r12, r12, &(0x7f00000000c0), 0xffffffff) execveat(r12, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r12) fsetxattr$system_posix_acl(r5, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r8, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r9, @ANYBLOB="1765a6449a8e5066cd1dad4d", @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) fchownat(r0, &(0x7f00000000c0)='./file0/file0\x00', r2, r11, 0x400) fchmodat(r0, &(0x7f0000000080)='./file0/file0\x00', 0xa) r13 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2) r14 = socket$netlink(0x10, 0x3, 0x0) writev(r14, &(0x7f0000fdbff8)=[{&(0x7f00000025c0)="290000002100190000003fffffffda260200000000e80001040000040d00140000000000132eb75c35", 0x40d}], 0x1) r15 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r14, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r15, 0xc, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xd, 0x8001, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_RESET_LINK_STATS(r13, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r15, @ANYBLOB="080026bd7000fedbdf2501000000000000000c4100000014001462726f6164636173742d6c696f6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0x400, 0x2, 0x8, 0x2579, 0x2, 0x4, 0x8}) 00:58:30 executing program 4: epoll_create(0x401) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) [ 2468.384797] audit: type=1400 audit(1575075445.004:583): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:30 executing program 0: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = accept$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x381) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000100)={0x73e9, {{0xa, 0x4e21, 0x8, @local, 0x1}}, 0x1, 0x1, [{{0xa, 0x4e21, 0xfffffff8, @mcast1, 0x401}}]}, 0x110) exit(0x0) preadv(r1, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x5, 0x2, 0x3, 0x3, 0x8, 0x800}, 0x20) 00:58:30 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/de\x02\x00vga_arbiter\x00', 0x101840, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x400, 0x4) writev(r2, &(0x7f0000000540)=[{&(0x7f00000000c0)="414428f5c5b5783409e5138d208a0d6052f723dc231e1f3a1681bae2e4375dabdd63bff5f97d48a5828a35b55920114712eb492128f5612b8fe849a6074a601054c4fc9939b5478fcee8c59a", 0x4c}, {&(0x7f0000000180)="d70b34e7923f3e3432ad710032572910061ee2142484c83ccaade59228e357792dcb79620f452cd91ae120178f49ddc2794a94db5f51659512bfb8ac7f9bfde4c1aea088c93a11cdcc09d9d735b6afedc9937516e04a443b053c4fb8767326de81255b0a632f2a2796cbd23590334d65d8cd9a517d", 0x75}, {&(0x7f0000000200)="14d914a6d36d0466759049cb6d583d9bd1d2454771780e815bb8d707e2c02a85194f293950861c6437fedc36999130c7233849ee460a18c879eee62d2cdccbb28dcd5bc8824e10edbd6196c8b074b40200de40acdf893adcf0b014ad614e1f14a99051d0475f765768d2f5d60506f01698e6d0a53043311388a0493fe95ae97caa06f0eaaab92b965abd8c295ae65a20809c0c29a6cb48f84771ae39ffc6f8450b8f5608bbe1fdd1d697a7821b2f1fee41ca973f160dbab9957d7fb8987f7a2028911a477e198b0b9c4ca8836f7334f5", 0xd0}, {&(0x7f0000000300)="745fde2bd06ac62ed426f5dc3413a8e143ee31280a435490845dbb21b95ae862fa04c5fc01ccd6c59ebad4de7179df3df8b5d250af691e7cfdb905a91c0dbbf50d7f42156c4dca05b500e1276a0df19fefe06efdc6cf254ec6f43621c08fc7033e5861356433ed8a3694d8dc7b92479ed6fa103c79533737e3e2f2271786a83c096104de424ff7bc5bb99895b3282a666e7f899c6ab5615d5c78d93b8db8ccc20ded4f8b0e829204186c238a0192592083bcaf5d08146089edc020c2653e81070923", 0xc2}, {&(0x7f0000000400)="d79ee582ef105e8f2965af994a31d9a94b3f948b5d1de6335b8c4938edf33ea8ae39579c7c9878c570cb004d98371f02cb80c6a0e08ee1a5b011dac04fc8799b60604941bd25bac4c429a15d47085402db9fadc013652a0ee284a8139a17412e292568b50825f7eb66407b8add5b3e2acc4639d4e4e7ae", 0x77}, {&(0x7f0000000480)="f6cd419295c9fafdfadc4e1e9abbdcc56775a87d27d61bed53cef012aff373e7c8d5a68f5bc65a443b2f11387226fcdf7f7ab17f3fb78a8ff8ee66beff7346657c2e0948761546ee89b46f3fc33cf19a4f0f76656b53d298c22ab3f63466866e72d7e78e0bf8238c693f1ca25e55dde10613930ab4c30c5ec89eaa9cebad3adb47668ed477d6f7fb8eb6ca8bd350339a4a8958338cd1d86e66", 0x99}], 0x6) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x21) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x2000c0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:30 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:30 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2000000000}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000280)={0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000380)={0x8}, &(0x7f00000003c0), &(0x7f0000000480)={r1, r2+10000000}, 0x8) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000002c0)={{0xad68f19a34f8bba2, 0x0, 0x4, 0x3, 0x1}, 0x909, 0x8}) r3 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="af198e9db1470666cc8d3caff6e7ad77ba1f45e9a9f86baadf1288715b423ad03181d19c5668861a36c003b84563114f9aa5d88781c8af9aa4d385d9fc18aff01f457e62daeed9e7c0f687b99da3a0c459e5ab2d1be8cff6102f52ecc420941bfda012bd06bab22b97450c015c72ccff2a7442c0753e25b40c2fc3bb22426d24b36310b540975712eed7e6dcfc781e56ebf5285ac6d6b85c20ce1049f54a50ce5758d0b237b6afcbbe4383e8b9f51a160e550090f96e2dc8d6866f7dbd070f1b98c93a4e2fc95e44c7f3fa48887179863ee866bddcde21df62", 0xd9, 0xfffffffffffffffa) faccessat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80, 0x2b00) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='a', 0x1, r4) keyctl$link(0x8, r3, r4) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x1) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r6, 0x10e, 0x8, &(0x7f0000000180)=0xffffff9a, 0x4) 00:58:31 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:31 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) writev(r0, &(0x7f0000000740)=[{&(0x7f00000002c0)="60385b3bcfe01395d560def7798dc056afe1c0becb0565dad4ddcc69fe00fdc681e1295f591a5a99e5c16af058c1aff68ea28433c25b32e7e626b704211e76faa0a0f6d6004ff479f4725f5e0019a0c8a233a50708a1d698efefa2e631ea7742d342a308d380e9f00b2691c9c94e4d918a3d8522fbe2a12b64a5ed8525cb755873617a0400f5bea44a1fe89ff59a894530674127b149bbfb723be2f964f6b689241d58879aa82f3b77d297fd379f58631b6adee343d69b9674ed32b4de916aee18c969efac8ddfcc01cac473359d", 0xce}, {&(0x7f0000000040)="ddd506f8ffc2eab1376b8330ea23bd42f3fe2da81a6deb394b4a2c2f", 0x1c}, {&(0x7f00000003c0)="68cccb5f56dc237c3477572308c536f33a3c3590842a84fa555f03c7a4928570479021f2fe27af27ca5ba8c7fb79361a3255a813a467d3c46f0a9cea8f112e88d574e7f55bd712e9886c7ff5ead486834720b88bf8ddb7f4cb3e8b91a1dfdaaafdb6edd696bd97f8cd8474d3", 0x6c}, {&(0x7f0000000440)="f8d327f196310f6cc70a4fd8bbdde3addcf72aa71eaffa319e7c79e1020b89c4e3a8600953e85dc54b3a788e7e095f2900c10106e3d00a6c1692cdd05a87c95f1cc014095ad5b510a856c550726dcdcbf0b1aa67f1731c03991267ed13b406e0c3e4d3c7da5b739fefcd78fb7fa6189f7af5ddf7d0483c3e61771635ee79c818dd0615678a2e2a5e70d0456cd1e12f30f50d4b3ceceec73c3e9cb59c1d14325b080a89799dfd1922fe28473d63ddfb8bc5e86347dee0e4052f396a055023876867af4c4dae285eda6fda036328aae87b8962708bde38ca9efe0d2a745fd217274b86", 0xe2}, {&(0x7f0000000540)="231c26aa9f6a39d0e3bc07de40a47ca7ddb3ced3dcca7e40a304ae3be359f2bcb7aa526d59ac7ced60db3891da93e5bd9c97ea40a5d6b9d6bbdaa92fbe218901390a931660e66a3ac4ba8052862d93ccaf1b44ac71f17daf9c7f5acaa1b8d70732c5846188f12bd07327910150661b12fbab4e0098", 0x75}, {&(0x7f00000005c0)="5de5109e3255b33b725d0d0fc0a431b66102976a006af5c3bcfd9f0394bbfe214b1c7012dc6fe1f7c506e189815fb62a88030d4845483d18d4e926d0abb23fd1c897b8541265d3d6951e03b41134b2d4bd6d967672e86dbc7498b097ec5afb1bf448e9a38e5153f36cbfb007f9fdde3bee75428444855346aeea488ca746869413", 0x81}, {&(0x7f0000000680)="7c619e33f9a6b6d84a5757a4fc3c848f185159e05247985a21f68d419519af411b753501d161ad2433df9223d22974f6cb044bf0e467d21cc90174786797f66ae782a68a246f5b5a4a41c148e7ea637fa3a517e4d94bf31c83e0db540e4a3dc7733fb98ca9660f0febfd831e8f762a57818e8e6dc4cabe52e5fdc547b15520642942fc4d216773585070b489640ac207c8da736336a4fb8a88a1a63d3f25e63fcb0abede208248d97c23390781741c3214e252b202321d735651b93df3", 0xbd}], 0x7) r1 = dup(r0) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000000)={0xc, 0x80000001, 0x1}) 00:58:31 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2468.390789] audit: type=1400 audit(1575075445.014:584): avc: denied { dac_override } for pid=2154 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:32 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x100000) getsockopt$netlink(r1, 0x10e, 0x4a37f0e307fc1cf4, &(0x7f0000000080)=""/47, &(0x7f00000000c0)=0x2f) 00:58:32 executing program 4: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:58:32 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) [ 2468.545241] audit: type=1400 audit(1575075445.174:585): avc: denied { sys_admin } for pid=2061 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x403, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @remote}}}, @sadb_key={0x4, 0x9, 0xa0, 0x0, "015422f57bbb07d97cf74dc65e987b51b087e446"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0d}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x90}}, 0x0) pselect6(0x40, &(0x7f00000001c0)={0xa69, 0x2}, &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) 00:58:33 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:33 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:58:33 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:33 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400002, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f4500000000c4b40003349597003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:34 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7fcdf9b4cc2fe570c1d05689501d454c46020000000000000000c4b40003003e49360cd5a7185ed0f356483eb3905a191fdbf11fb88ffab73f6b566fd67d9a40fb9460cec3eda833f390e0a3319c9aa2444a4a70a35c9ee40c8f7e4023ac2e47417d553c636bb498adaa4b3ac31de19466da25d585f920efdd9c690e1c12029ec2"], 0x13) execveat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0xe00) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x8bd9456343de53fa, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r4) [ 2468.757114] audit: type=1400 audit(1575075445.384:586): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:34 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:35 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xedc0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 00:58:35 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:35 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:35 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x8f18, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4}, &(0x7f0000000240)={0x40, 0x0, 0x400}, &(0x7f0000000280)={0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x1ffe}, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/191, 0xbf}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x4, &(0x7f0000002480)=""/121, 0x79}, 0x2}, {{&(0x7f0000002500)=@sco, 0x80, &(0x7f0000000180)=[{&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000003580)=""/125, 0x7d}, {&(0x7f0000003600)=""/230, 0xe6}, {&(0x7f0000003700)=""/120, 0x78}], 0x4}, 0x5}, {{&(0x7f0000003780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000003840)=[{&(0x7f0000000200)=""/24, 0x18}, {&(0x7f0000003800)=""/23, 0x17}], 0x2, &(0x7f0000003880)=""/38, 0x26}, 0x4}], 0x3, 0x40000000, 0x0) recvfrom$inet(r0, &(0x7f0000003980)=""/9, 0x9, 0x100, &(0x7f00000039c0)={0x2, 0x4e24, @loopback}, 0x10) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) recvmsg(r2, &(0x7f0000004c00)={&(0x7f0000003a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004b40)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/14, 0xe}, {&(0x7f0000004ac0)=""/76, 0x4c}], 0x3, &(0x7f0000004b80)=""/72, 0x48}, 0x320) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/134, 0x86, 0x2000, &(0x7f0000004c40)={0x11, 0xf6, r3, 0x1, 0xe1, 0x6, @random="5d3b3baa5754"}, 0x14) [ 2468.758964] audit: type=1400 audit(1575075445.384:587): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:36 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c050f0000000000000000c4b40903003e469cde1a31f36a0eb16e7859b86f6ffec3deda74a869067ed1b8b23562e68e833e8ad2b8ea6c544bc6de7c4c74611f39513a3e63779f547890691e5c3e1810e1548c233512069c06d761b8fad6cdaca9aa12fdeca46858455e717808db7e8bf751"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r5, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9b}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x85a}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x68}, 0x1, 0x0, 0x0, 0x200000c0}, 0x40) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0), 0x4) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r7, r7, &(0x7f00000000c0), 0xffffffff) execveat(r7, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x1000) dup(r7) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c600009ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f15676a75860bb9b3b959333a59414f650f22eb0500"/504], 0x4f5) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = dup(r6) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x3) fallocate(r8, 0x0, 0xd270, 0x6) 00:58:36 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x200, 0x2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x4000000000, 0x2000000000000}, &(0x7f0000000280)={0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0) 00:58:37 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:37 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:37 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x1, 0x0, {0xe0}}, 0x18) [ 2468.836080] audit: type=1400 audit(1575075445.464:588): avc: denied { net_raw } for pid=2185 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:37 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r2, &(0x7f00000009c0)=ANY=[], 0xfffffffffffffee0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x8) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TIOCSSERIAL(r5, 0x541f, &(0x7f0000000040)={0x2, 0x32, 0x7d, 0x2, 0x0, 0xffff0001, 0x8, 0x400, 0x1, 0x7, 0x3, 0x7f, 0x0, 0x7, &(0x7f0000000180)=""/219, 0xfffd, 0x7, 0x800}) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r3) r7 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r7, r7, &(0x7f00000000c0), 0xffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$KDGKBMETA(r6, 0x4b62, &(0x7f0000000100)) dup(r7) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 00:58:37 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0xfffffffffffffff9}, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x202200, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = dup(r6) write$cgroup_type(r7, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000500)=0x6, 0x6) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="3800000010000507000000000000000000000000543992bfa4ad9d9a6e5da22714f84ae7d83ce1b131554b1be958ae35e10859811b93d66347f4f7170e00753cda21602f276e6d8862f3df59ce8419607b8c39850bf3cce48d9a072ff78c1a98cb28105b2a200afbe2e90857dc331b20bd45df9195611075f1352b1c549831bcf5202026d1d7b6e9ff76cc2c5a874feff8e0387a8822d4ef501f53b07e2149030f08c3771e7b1591f464f69df95149", @ANYRES32=r8, @ANYBLOB="00000000000000001800090008007369767469000c00020008000100", @ANYRES32=r8], 0x38}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r8, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) r10 = socket(0x10, 0x3, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r14}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x3}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r14}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x208000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x188, r1, 0x200, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x120, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r14}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x188}, 0x1, 0x0, 0x0, 0x4084}, 0x40) 00:58:37 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:38 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:38 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) [ 2468.837754] audit: type=1400 audit(1575075445.464:589): avc: denied { dac_override } for pid=2188 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:38 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f4503003e00"/19], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3f}, {0xa, 0x4e22, 0x4, @rand_addr="e5a2f852ed760aad88bfb55f31ee8740", 0x5}, 0x8001, [0x3ff, 0x5, 0x8, 0x62e, 0x8, 0x6, 0x6, 0x6]}, 0x5c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:39 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:39 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r1) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[], 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r0) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000e7b40003003e"], 0x13) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinuy/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x2, 0x3, 0x0, 0x6, 0x8001, 0x1}) faccessat(r4, &(0x7f0000000080)='./file0\x00', 0x8, 0x400) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r6, 0x0) ioprio_get$uid(0x3, r6) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2468.855767] audit: type=1400 audit(1575075445.484:590): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:40 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) pipe(&(0x7f0000000380)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:40 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003ed7d69cc1cc9b9abb8881857fa805771fcab14ec9451c44c6b53c2962d87babf7eae3aee5cb9c0771db2086ffb6e6a9d65bce1e57bd8a41963ccd9b783cf6563f000000000000003f63"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x2) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:58:40 executing program 5: pselect6(0x40, &(0x7f00000001c0)={0x8f18, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4}, &(0x7f0000000240)={0x40, 0x0, 0x400}, &(0x7f0000000280)={0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x1ffe}, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/191, 0xbf}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x4, &(0x7f0000002480)=""/121, 0x79}, 0x2}, {{&(0x7f0000002500)=@sco, 0x80, &(0x7f0000000180)=[{&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000003580)=""/125, 0x7d}, {&(0x7f0000003600)=""/230, 0xe6}, {&(0x7f0000003700)=""/120, 0x78}], 0x4}, 0x5}, {{&(0x7f0000003780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000003840)=[{&(0x7f0000000200)=""/24, 0x18}, {&(0x7f0000003800)=""/23, 0x17}], 0x2, &(0x7f0000003880)=""/38, 0x26}, 0x4}], 0x3, 0x40000000, 0x0) recvfrom$inet(r0, &(0x7f0000003980)=""/9, 0x9, 0x100, &(0x7f00000039c0)={0x2, 0x4e24, @loopback}, 0x10) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) recvmsg(r2, &(0x7f0000004c00)={&(0x7f0000003a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004b40)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/14, 0xe}, {&(0x7f0000004ac0)=""/76, 0x4c}], 0x3, &(0x7f0000004b80)=""/72, 0x48}, 0x320) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/134, 0x86, 0x2000, &(0x7f0000004c40)={0x11, 0xf6, r3, 0x1, 0xe1, 0x6, @random="5d3b3baa5754"}, 0x14) 00:58:40 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:41 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c460200000000edff0300c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2468.857615] audit: type=1400 audit(1575075445.484:591): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:41 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:41 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:41 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r2], 0x14) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2469.088739] audit: type=1400 audit(1575075445.714:592): avc: denied { dac_override } for pid=2185 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:42 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003ed7d69cc1cc9b9abb8881857fa805771fcab14ec9451c44c6b53c2962d87babf7eae3aee5cb9c0771db2086ffb6e6a9d65bce1e57bd8a41963ccd9b783cf6563f000000000000003f63"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x2) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:58:42 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:43 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:43 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 00:58:43 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:43 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) fcntl$setflags(r0, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) [ 2473.891662] audit_printk_skb: 93 callbacks suppressed [ 2473.891672] audit: type=1400 audit(1575075450.514:624): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:44 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:44 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:44 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 00:58:44 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:44 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2473.930500] audit: type=1400 audit(1575075450.554:625): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:45 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:45 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 00:58:45 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:45 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) io_setup(0x7b129577, &(0x7f00000001c0)=0x0) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r5) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x101000, 0x0) r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r8, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r8, r8, &(0x7f00000000c0), 0xffffffff) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r8) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r11 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/enforce\x00', 0x28201, 0x0) r12 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r12, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r12, r12, &(0x7f00000000c0), 0xffffffff) execveat(r12, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r13 = dup(r12) write$cgroup_type(r13, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) io_submit(r4, 0x8, &(0x7f0000001ac0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x1ff, r5, &(0x7f0000000200)="5359916fb3d54467e789f854c9bd873966c03df00a9db21df3aed99633a3496ef91d38356c35bea7c09e9ed3ca78136071c76e0cd0098e3c9a08f402ff80d5685ae77fbf4b950c9f472efb585a9809e184dc35616c77bed58621e480b42d57361fea8e24150027d6", 0x68, 0x4, 0x0, 0x0, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x131, r0, &(0x7f00000002c0)="7e93bb0a4b9f78d3537752733fa98a756e36b0550cac15ccd8902fd2c3594afe1ef66dc9ac8a764024b9089e81bc2595d4bcd90d8972cc62f2dc47a37df8e1f0cb1ab6acaf4e91e7", 0x48, 0x7f, 0x0, 0x2, r2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x7, r6, &(0x7f0000000380), 0x0, 0x40, 0x0, 0x3, r7}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x0, r8, &(0x7f0000000440)="2688c5c31d301b919a86094b1c9d3fbbc93eabe83fc991c4dbd7f302c57d293ad3705fe05e7faa86a725a31e49eaef7234e8d18e4e335ac6862d39f832b213135741fab4e31b57bc88032cc6ef873408bb722081a633917026528c6edc6b65113ce1886d99b3ed36c29c2ef9336289077bf2dc7cb5b3ad01fb9b069aa4083be85e543002bb4520d9", 0x88, 0x4}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x3, 0x6, r3, &(0x7f0000000540)="d0ebf1c970c8d54944e8bcf9946a34dfb7d665a04fd32d0c71fd146ad889bfd4bc85e36845968f0c82087c7fe1889caa0bb597e0e729f36332aa4448a916d2c4a53dd56a889b3fbfee4a1f2569bf87af91a376ee2afd0d6a81a1a3411d8eaed4ce83e407e0befe167f3944a9b39c66185702509f0c97ab99148ede0462c99d188c10bb6d82a7943ed9afe7b3bc77d6323c72cdd5f41e83e0cfa0c6069dd5", 0x9e, 0x3, 0x0, 0xe2b347a5c3e8f671, r2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x7f, r10, &(0x7f0000000a00)="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", 0x1000, 0x8, 0x0, 0x2, r11}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x2, 0x1, 0xffffffffffffffff, &(0x7f00000006c0)="1e9fb0dfa0a14d4964444f32429faebbca77fdbddc5f47f390d4abaa0c27e0ee9ab92b234e2caf1f3d0a27e11a69cec5d6503c287cccb17bea693cd928819eeec6460daa3f1414af36aa5764e5286294d35c1ec6b3e35371f1680c64b7", 0x5d, 0x0, 0x0, 0x3}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x7, r13, &(0x7f0000001a00)="2fa17cc67525185c052a9e2c2ba400d82031930138db4d184ba7b31d940893cd1d107e9758c6a84aa2ad68a4422dd0a8c7c2e2d28348f040170b24c7e87b7c6d1dc502743416f3f1e94f0b8ad74c7cb7ea579f7fcb4c75b49c66d86ea2d533ac9344816fff08187775cda396dc430fd53c71d157e39660271c8d0e30ad3b8b54d3111e1b1537bdad20eb0dac", 0x8c, 0x2, 0x0, 0x3, r2}]) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r14 = dup(r3) write$cgroup_type(r14, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) getsockopt$inet_tcp_int(r14, 0x6, 0x17, &(0x7f0000000100), &(0x7f0000000180)=0x4) bind$unix(r2, &(0x7f0000000040)=@file={0x3, './file0\x00'}, 0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:45 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) [ 2474.542658] audit: type=1400 audit(1575075451.164:626): avc: denied { net_raw } for pid=2315 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:46 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:46 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:46 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000001c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:47 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:47 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r2], 0x14) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:47 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:47 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2474.550552] audit: type=1400 audit(1575075451.174:627): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:47 executing program 4: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r0, r0, &(0x7f0000000040)=0x2, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) write$cgroup_type(r2, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r5, &(0x7f0000000040)=""/253, 0xfd) r6 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r6, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="010a04b30000000027a83ca0a772d65bf2a4073921c74ec01d8d61c617e1a4ed8bf6b5c8266198b3a61b730915b4fd83416a589a063ef31a50c793c1945f27529ed3510d976b99c02727c1455b45fe9dfbbe099a83d92de5cb28524de7592d0d88d7b72b747f93c66677b6eba6213d8ec01628e07bb7253d87cbba4a3358accf96f0aa391208ce915ff9bd7c5df641fd10de0aa01cb6af8c9cda994eb8c8c2211ced1d37a07f91945263a8f7acc759616d7bf392e31a796891188bd6c8d62395947964c246b6afb8c41b3c82ebfcb02908f4b924c4e1f3d1235328b1830258a85cdeb1e3", @ANYRES16=r7], 0x2}, 0x1, 0x0, 0x0, 0x30000000}, 0x801) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{&(0x7f0000000340)=@tipc=@id, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000000580)=""/90, 0x5a}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/207, 0xcf}], 0x4}}, {{&(0x7f0000000ac0)=@rc, 0x80, &(0x7f0000000240)=[{&(0x7f0000000b40)=""/224, 0xe0}], 0x1}, 0x1f}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000000c40)=""/101, 0x65}, {&(0x7f0000000cc0)=""/178, 0xb2}, {&(0x7f0000002f40)=""/200, 0xc8}, {&(0x7f0000000500)=""/12, 0xc}, {&(0x7f0000003040)=""/158, 0x9e}, {&(0x7f0000003100)=""/167, 0xa7}, {&(0x7f00000031c0)=""/220, 0xdc}, {&(0x7f00000032c0)=""/190, 0xbe}, {&(0x7f0000003380)=""/129, 0x81}, {&(0x7f0000000d80)=""/68, 0x44}], 0xa, &(0x7f0000003500)=""/200, 0xc8}, 0x800}, {{&(0x7f0000003600)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000047c0)=[{&(0x7f0000003680)=""/4096, 0x1000}, {&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000004680)=""/161, 0xa1}, {&(0x7f0000004740)=""/73, 0x49}], 0x4}, 0x7ff}, {{&(0x7f0000004800)=@generic, 0x80, &(0x7f00000049c0)=[{&(0x7f0000004880)=""/218, 0xda}, {&(0x7f0000004980)=""/40, 0x28}], 0x2, &(0x7f0000004a00)=""/129, 0x81}, 0x7}, {{0x0, 0x0, &(0x7f0000004e40)=[{&(0x7f0000004ac0)=""/244, 0xf4}, {&(0x7f0000004bc0)=""/14, 0xe}, {&(0x7f0000004c00)=""/198, 0xc6}, {&(0x7f0000004d00)=""/58, 0x3a}, {&(0x7f0000004d40)=""/230, 0xe6}], 0x5, &(0x7f0000004ec0)=""/141, 0x8d}, 0x9}, {{&(0x7f0000004f80)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000005040)=[{&(0x7f0000005000)=""/55, 0x37}], 0x1, &(0x7f0000005080)=""/37, 0x25}, 0x8}, {{&(0x7f00000050c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000005140)=""/125, 0x7d}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x2, &(0x7f0000006200)=""/255, 0xff}, 0x200}, {{&(0x7f0000006300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000065c0)=[{&(0x7f0000006380)=""/8, 0x8}, {&(0x7f00000063c0)=""/207, 0xcf}, {&(0x7f00000064c0)=""/248, 0xf8}], 0x3}, 0x4}, {{&(0x7f0000006600)=@hci, 0x80, &(0x7f0000006940)=[{&(0x7f0000006680)=""/109, 0x6d}, {&(0x7f0000006700)=""/168, 0xa8}, {&(0x7f00000067c0)=""/161, 0xa1}, {&(0x7f0000006880)=""/156, 0x9c}], 0x4, &(0x7f0000006980)=""/156, 0x9c}, 0x702}], 0xa, 0x3d4a27757c8c71eb, &(0x7f0000006cc0)={0x0, 0x989680}) r9 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r9, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r9, r9, &(0x7f00000000c0), 0xffffffff) execveat(r9, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r10 = dup(r9) write$cgroup_type(r10, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4a008000}, 0xc, &(0x7f0000000640)={&(0x7f0000006d00)=ANY=[@ANYBLOB="20010000", @ANYRESHEX=r10, @ANYBLOB="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"], 0x3}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r7, 0xbd98a0dc61bd0a5b, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4b1a}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xbd}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x8000) write$cgroup_type(r1, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) r11 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r11, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r11, r11, &(0x7f00000000c0), 0xffffffff) execveat(r11, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r12 = dup(r11) write$cgroup_type(r12, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet6_group_source_req(r12, 0x29, 0x2c, &(0x7f0000000e00)={0x10000, {{0xa, 0x4e20, 0x5, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0x1}}, {{0xa, 0x4e22, 0x5, @mcast2, 0x1}}}, 0x108) r13 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r13, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r13, r13, &(0x7f00000000c0), 0xffffffff) 00:58:47 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="962fe6db2fb91ac1a785707f66c8ab0cd7ccbe16e8442c84566f472168787515d2f3862480eddd3735881c4b79a0a76953424684f88c146ce9a6196e22b0a80922bb6677a7da92693e62f35cee57d5a0211c4533d71a415126f11d91975df9fdb5fee7e6b05652287fcd106b59ba9a9b9742d69719865f1b51f98b9d4c687891d03e9a78a745fa6da8f8c94d793141f414dc3e1df3426037e97ff1e7e7be287cd0"], 0xffffffffffffff9f) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) 00:58:47 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c460200000000000000000003003e0000"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(r2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:48 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:48 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) fcntl$setstatus(r1, 0x4, 0x44800) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r3) io_submit(r2, 0x2, &(0x7f00000003c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0xcd58, r0, &(0x7f0000000180)="1c296afd6a4bb1df46550c7d2a79e5bca7727af81c6c04cd63c9777ad8cd64cf5ba33e89667b1864ed927582334ff99bf69a20f3554ba6d7fc7177b12d511c78496120a1ee750d75784d96b7148957c210add2644f25b2cd08bddaf84ed10cb57185a85fbf8a86106c969628eb7b19d6cc05c7ef93668cc18959a909477fff0509e8160472678bbe", 0x88, 0x1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x2e, r3, &(0x7f0000000280)="4ee9135063c206f652947702612d449bc2ff0e2ca8cdc5e9b59683b3e39814d534a98023d505955099fc8ed8f87a153816a3f7458344c1c91a7b05e1aee1af07957069fa8b5e231534df87e861d01646a154b381c476797c1233de519334609a34fd8e3b2844de66aaca02d2080223ccc91087afcd165083a5babfabf4786072935d0815ebaddfd63d6d323c19be80ec2c1ac86356393517c19be0d6c0e0f9adfc86b6251ad02832b72744b1fbd849a2a1ad383e92d1a3efa0f54479084cc7ab9ccd12c50118d12f044f9c", 0xcb, 0xffff}]) memfd_create(0x0, 0x0) r4 = socket(0x2, 0x800, 0x5) r5 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x40002) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000100)={{0x3, 0x3, 0x8, 0x0, 0x77e0}}) getpeername$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_emit_ethernet(0x93, &(0x7f0000000400)={@dev={[], 0x29}, @broadcast, [{[], {0x8100, 0x7, 0x0, 0x3}}], {@ipx={0x8137, {0xffff, 0x81, 0x3, 0x2, {@broadcast, @broadcast, 0x4}, {@random=0xcdc, @random="f6b8ea036989", 0x1f}, "1309d55c3d60bb5be94eaf17759734a64e838e03f9902c1ba521f5a1a491d2cb51189a4bffa5c830a158d0379dd29453d46ceabba421996aad210bd6c71a077d120583d963459227cdd0822961a1b3dd1bfe9a124c0d916d0e31cae2625a38bbf5fae0"}}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r6 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r6, r6, &(0x7f00000000c0), 0xffffffff) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r6) preadv(r6, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/4, 0x4}, {&(0x7f0000000500)=""/13, 0xd}], 0x2, 0xfffffffffffffff8) 00:58:48 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) 00:58:48 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2474.552295] audit: type=1400 audit(1575075451.174:628): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:49 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:50 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:50 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:50 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) [ 2474.646112] audit: type=1400 audit(1575075451.274:629): avc: denied { dac_override } for pid=2315 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:50 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getflags(r1, 0xb) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2475.725869] audit: type=1400 audit(1575075452.354:630): avc: denied { net_raw } for pid=2327 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2475.816160] audit: type=1400 audit(1575075452.444:631): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:53 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0xfffffffffffffffd, 0xba}, &(0x7f0000000240)={0x0, 0x0, 0x20000, 0x0, 0xfffffffffffffffd}, &(0x7f0000000280)={0xfffffffffffffff9, 0x0, 0xffffffffffffffff}, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="8ad01da2636c714808231f09462c735272f0d0ac994e1df32d679f41300c39abce86275793a9d661c1781c496e2bfe1740a55035064e302c64b9234c3d78", 0x3e) 00:58:53 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) 00:58:53 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:53 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000d1b40003003e"], 0x13) r1 = gettid() tkill(r1, 0x10010000000032) r2 = syz_open_procfs(r1, &(0x7f0000000040)='oom_adj\x00') ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$selinux_load(r2, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "eea293ab6019495ffec2a28d9d0828214270718801e899bcdf0e26bc5a6f4989735585958facaf5113d3ab803a080c3942bb6f3f67a425d58794d846153536621cd4050ccd9fa05deb80513746702c56356fd3231a0184f4090e03b12b72fc8287d31b275e1728788433570a19ea053b16c9724273f47d75345d7b84b4c1d8b3cb2467c6d3b4985b0c65dcd4766dff89926364899071de2f9460bdd799b4"}, 0xae) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:53 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:53 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:53 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c3db7f68d5c66fc7a7d354a46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2475.817773] audit: type=1400 audit(1575075452.444:632): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:54 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0xa0000, 0x0) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r4) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f00000001c0)) poll(&(0x7f0000000180)=[{r3, 0x6ff}, {r4, 0x4000}, {0xffffffffffffffff, 0x200}, {r1, 0x10}], 0x4, 0x8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = dup(r2) write$cgroup_type(r7, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$RTC_PIE_OFF(r7, 0x7006) 00:58:54 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:58:55 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:55 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:55 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) [ 2475.924499] audit: type=1400 audit(1575075452.544:633): avc: denied { dac_override } for pid=2327 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:55 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) 00:58:56 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r2, 0x0, 0xd, &(0x7f0000000040)='$.6/%cpuset]\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 2480.276255] audit_printk_skb: 24 callbacks suppressed [ 2480.276267] audit: type=1400 audit(1575075456.904:642): avc: denied { net_raw } for pid=2366 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:57 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:57 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:57 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) 00:58:57 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) [ 2480.309685] audit: type=1400 audit(1575075456.934:643): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:58 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c460a0000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20020008}, 0xc, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[@ANYBLOB="37de4fb4531dd060c4818f23a541ab684109c0089e5c8e323006679b51d003730f59ff9f7a34af2f79010dd9a964b030167bf87968575e4ff7a42ed7c09bd5518bf5c77a8aa98f7998a22e7bd7035c4370bbd3a16318cef24464d0807d67a7e46c0295d2df943aed82e8f45cd8396ccd5e91cbd97975857f3ae2afac92104d1d6e30296bdbff2f4d94b1be9d84b9e3f80f5e80f4f63b64c7655f916ad30a70975eba61ce42ba8ac617fd8ee62b9192e44dc95efe577a5cd4e60fd5a5ec20006f", @ANYRES16=r4, @ANYBLOB="000325bd7000ffdbdf25070000000c0005000800010069620001180007000c00040010000000000000000800010000800000"], 0x38}, 0x1, 0x0, 0x0, 0x8100}, 0xbf1ba2e281eb8e4e) sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x1, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x24048004}, 0x40) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:58:58 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:58:58 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:58 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) 00:58:58 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) [ 2480.316313] audit: type=1400 audit(1575075456.944:644): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:58:59 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454cb0020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000180)=""/206) 00:58:59 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:58:59 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e"], 0x13) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:59:00 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xedc0) [ 2480.335988] audit: type=1400 audit(1575075456.964:645): avc: denied { dac_override } for pid=2366 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:00 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) accept4$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x80000) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in6=@remote, 0x4e23, 0x81, 0x4e20, 0x0, 0x2, 0x100, 0x40, 0x56, r3, r4}, {0x0, 0x40, 0x1, 0x1f, 0x800, 0xff, 0x1, 0xd40}, {0x2000000000, 0x6b48, 0x7fff, 0x2}, 0x6, 0x6e6bb2, 0x1, 0x3}, {{@in6=@mcast2, 0x4d6, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0xd365817c430e3ec5, 0x0, 0x3a, 0xd6ed, 0xe9, 0x4}}, 0xe8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet6_opts(r6, 0x29, 0x4c, &(0x7f0000000180)=ANY=[@ANYBLOB="2f100408094005aa0000000086f84f192c011c0be60a9f00000000400000000000000001ff020000000000007f000001fe8000000000000000000000000000bbfe880000000000000000000000000001ff020000000400000000000000000001fe8000000000000000070000000000aa00000000000000000000000000000000ff01000000000000"], 0x88) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 00:59:01 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:01 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:59:01 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454cb0020000000000000000c4b40003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000180)=""/206) [ 2480.533931] audit: type=1400 audit(1575075457.154:646): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:02 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) 00:59:02 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:02 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:02 executing program 1: r0 = memfd_create(&(0x7f0000000040)='$.6/%cpuset]\x00', 0x6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="980003f4561f8ffe000000000100"], 0xe) execveat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20280, 0xc2) openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) memfd_create(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$cgroup_type(r3, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000180)={'team0\x00'}) accept$packet(r3, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 00:59:03 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:03 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) [ 2480.709875] audit: type=1400 audit(1575075457.334:647): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:03 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:03 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) vmsplice(r2, &(0x7f00000006c0)=[{&(0x7f0000000100)="10c9b9cfac9eadeda3e3863bac568fc54f811b19cf9fffcfc3f988141a49fad58a247bf7b5d924ef630113785ea998da1ef8e7a8", 0x34}, {&(0x7f0000000180)="e001", 0x2}, {&(0x7f00000001c0)="acf861ba1c17371eb6e8fce7cfd93fae19c19c77e1cc50e8cb6355dd59767cf7242237305f331152b78b1b3b62878f9521da18647a5ec93ff8d5436402fc5415913d32cef766dc3af335", 0x4a}, {&(0x7f0000000240)="adbc264a5f07ef72c6a6981c0f798c2d5c3420388c0790b25b10b569bce1fc6a706dc7c091dc9d47fdf2e833d3a44aecafa6d5ba7719f4350bbdc1f00c80844b622f2486c6ef23791be0d68c86b3e2008ac325db78eb99a6099f0334e87ff55be1b5c8555b6fe2260911fe58ac47b2ee04d4887ad4055b19db4dc86a39d0ff3fc260ccb436f07130d04a874cd666bbea8265028fd276375b606946df10577ba5aa1aef8ccb033d4284298e", 0xab}, {&(0x7f0000000300)="44a4bb2b3fedbc030b35ffc12ea33171d0fe0632f894a373a123b36d9c971394e862ad6906cb60270556b3ccad6b4fc2d202c9d371a1454fad8dcd7e3f8173d12335db7e6d0906191a66bfee8b306eea6deceaa5b817127279ab", 0x5a}, {&(0x7f0000000380)="1f8577037dec134f163b70975742d2c00b4ab86732ab9fc29f59d416b6", 0x1d}, {&(0x7f00000003c0)="b0686104fa552cdce2557969643a0c00e15614459e00d350a6d4bafd903a56f74769e4018eb976a0455c9f4b92f1cf6cf4ab51009de66f194dbcb9fb2ab3a9", 0x3f}, {&(0x7f0000000400)="0acc97af6a0f1eabdbe8acb4e2f13546cac99009c468cd0ec367467d251b2de0fdcc32df4f17139373f777d2595edc216c271bde7d7792d0a63bf7656f5e2724dd3dead491687d879709664f56225ee328d842716c7f34ebcfe0fb83e636bf918a51cfe4fd8bdf15d8836bdc821a3b450038cbe8e8155d5a25778771cd9c4d6b1f86cb", 0x83}, {&(0x7f00000004c0)="bb9c1bdad208c53318a66235244953dd17a1e037124d68370b334eec05a33451b078cd8f90e2c1b9051c6c47dcbd9b2c11b2b35264a72a9d24612712deafa3c4e5d78a3349c8af13cbcca4c38b8aea4eb7fbbaf4c72e7a05d525bb1741f316648dd8a3b2636d75492cb8438fae4be0c1004c4c11113989eb7b6d377f5dd106a7a6544c6b563a6812f9e97f753d05762aa1fb4922e59f9c15c4da91b77836df7edfe703f873043e1528ad65492f6204d5dd02b6ec1357a9e6e490036cb2df0459f07d694c449769a447a71a391fa09ce6c4ed6abd12784dafcfa59617dc17fae6533946e9bb484b50709091c91330", 0xee}, {&(0x7f00000005c0)="d0860854b563cff0a100ebba30eb78e8d49281d7f0b8acaca5e6c431e67a6ab9bed95d5efc967bd273eb07f04f8840991aac1636d47b0b697d034cf2389cc9f5231af042fe7f58cc9a04cef445c4668c38b70905315596ede63329dbb120450934851701c80731869defda9e0af7f454d11520b3b5baab73c092a701e6ab2d7600524e55668a95cfa3bbc17bc19bf6fc70e3a454e3f9953633d46a2bfc94a6017b6a03c8b27a197b5aed7aca6ae259801b64ae5df29f7e6cd91f2fb74c8786529ae4", 0xc2}], 0xa, 0x6) write$binfmt_elf64(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$KDGKBENT(r4, 0x4b46, &(0x7f0000000040)={0xf7, 0xc2, 0x5}) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:59:04 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:04 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) [ 2481.013538] audit: type=1400 audit(1575075457.634:648): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:04 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:59:04 executing program 1: clock_gettime(0x4, &(0x7f0000000300)={0x0, 0x0}) setitimer(0x2, &(0x7f00000001c0)={{}, {0x0, r0/1000+10000}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x13b) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000040)={0x758, 0xb9, 0x1}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x2, &(0x7f00000001c0)={{r3, r4/1000+30000}, {0x0, r2/1000+10000}}, 0x0) 00:59:05 executing program 1: clock_gettime(0x4, &(0x7f0000000300)={0x0, 0x0}) setitimer(0x2, &(0x7f00000001c0)={{}, {0x0, r0/1000+10000}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setitimer(0x2, &(0x7f00000001c0)={{}, {0x0, r1/1000+10000}}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r4, r4, &(0x7f00000000c0), 0xffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = dup(r4) write$cgroup_type(r5, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x120) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r3) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$TCGETS2(r6, 0x802c542a, &(0x7f0000000100)) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x1) [ 2481.074290] audit: type=1400 audit(1575075457.694:649): avc: denied { dac_override } for pid=2382 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:06 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:06 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:59:06 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) [ 2481.152074] audit: type=1400 audit(1575075457.774:650): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:08 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f59a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ed3c64b249ddeff684da4110789bfc185e510d313c8c43b5a3e35550ff73a836f6917b7730e00f3624b1390fc59dff51e25442b09a23da545c2714882a09b563cff49367a2ef879923e132f7a93c7a9aa018097bc01678cc220440e18dbd048e984e9bc8de87ef7a34cb4eee0a7f4e9d05ebaec752e84d9638c2170ab33ea894f157b777aa20ce04465c2ac85c0ee2d7e6b676a75860bb9b3b959333a59414f650f22eb05"], 0x3c) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r3) write$cgroup_type(r4, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000340)={0x7, 0x80000000, 0xff, 0x1, 0x7}, 0x14) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000180)=0xb, 0x4) listen(r2, 0x0) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r5, r5, &(0x7f00000000c0), 0xffffffff) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r5) write$cgroup_type(r6, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x100, 0x0) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r7, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x11c, r8, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$DEVLINK_CMD_GET(r6, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x220000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r8, 0x400, 0x70bd28, 0x25dfdbff, {}, [@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000050}, 0x40000) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) inotify_init() getsockopt$inet6_mreq(r1, 0x29, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000040)) pselect6(0x425, &(0x7f00000001c0)={0x0, 0x8be0, 0x0, 0x0, 0x0, 0x400000000000}, &(0x7f0000000240)={0x0, 0x7, 0x1000000000, 0x0, 0x0, 0x0, 0x1f}, &(0x7f0000000280)={0xfffffffffffffff9, 0x2}, 0x0, 0x0) [ 2481.301835] audit: type=1400 audit(1575075457.924:651): avc: denied { net_raw } for pid=2392 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:08 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) 00:59:08 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:08 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) 00:59:09 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) 00:59:09 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r3, &(0x7f0000000140)="05", 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000011001, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) [ 2485.516867] audit_printk_skb: 69 callbacks suppressed [ 2485.516880] audit: type=1400 audit(1575075462.144:675): avc: denied { net_raw } for pid=2464 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:59:09 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r1, r1, &(0x7f00000000c0), 0xffffffff) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) sendfile(r2, r2, &(0x7f00000000c0), 0xffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r2) r3 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r4, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r5, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = socket(0x18, 0x803, 0x0) fstat(r11, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r9, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r10, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r13, &(0x7f0000000200)=""/250, 0x50c7e3e3) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket(0x18, 0x803, 0x0) fstat(r19, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r14, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=r16, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1dcd67f8a3faad2229d0df87f", @ANYRES32=r17, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r18, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r20, @ANYBLOB="08000200", @ANYRES32], 0x18, 0x3) getgroups(0x3, &(0x7f00000001c0)=[0x0, r20, 0x0]) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000200)={{}, {0x1, 0x2}, [{0x2, 0x2, r4}, {0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x4}], {0x4, 0x3}, [{0x8, 0x1, r10}, {0x8, 0x0, r21}], {0x10, 0x5}, {0x20, 0x4}}, 0x4c, 0x1) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r22 = dup(r1) write$cgroup_type(r22, &(0x7f0000000080)='\x00\x00\x00!\x00', 0x9) ioctl$PPPIOCATTACH(r22, 0x4004743d, &(0x7f0000000100)=0x2) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwrite64(r0, &(0x7f0000000000)="7fc7f516a08d66e16478316d5cc3a86347c44635c7fedbae1340f05cc91cc938a87d488e0f8ae7464fe0d18ae2d099c24ff7f250c740acb51ff45ffb4b2d795ccfbc2c69fba8991d0a3a9cf3ced231f0c47bdecea785cdc518ba9dcdd2cfb7dd5b21c1b1af3e7ad2cda2010c6dffb4b9a0dbe1240f5720c6fb20d8e9d21423f2e70e963508286d1bedc5dec1ac974b36385ba6438fe331162090b13beb977e17", 0xa0, 0x9) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:59:09 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240)={0x0, 0x0, 0x3}, &(0x7f0000000280)={0xfffffffffffffff8, 0xfffffffffffffffc}, 0x0, 0x0) [ 2485.538527] audit: type=1400 audit(1575075462.164:676): avc: denied { dac_override } for pid=2464 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2485.626600] audit: type=1400 audit(1575075462.254:677): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2485.767057] audit: type=1400 audit(1575075462.394:678): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2486.006444] audit: type=1400 audit(1575075462.634:679): avc: denied { dac_override } for pid=2445 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2486.229942] audit: type=1400 audit(1575075462.854:680): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2486.235938] audit: type=1400 audit(1575075462.864:681): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2486.466454] audit: type=1400 audit(1575075463.094:682): avc: denied { net_raw } for pid=2484 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2486.549903] audit: type=1400 audit(1575075463.174:683): avc: denied { dac_override } for pid=2484 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2486.707744] audit: type=1400 audit(1575075463.334:684): avc: denied { net_admin } for pid=2484 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2487.567055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2502 comm=syz-executor.4 [ 2488.285023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2510 comm=syz-executor.4 [ 2490.305628] binder: 2601:2607 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 2490.305972] binder_alloc: 2601: binder_alloc_buf, no vma [ 2490.305990] binder: 2601:2607 transaction failed 29189/-3, size 0-0 line 3136 [ 2490.330775] binder: undelivered TRANSACTION_ERROR: 29189 [ 2490.423563] binder: 2601:2606 Acquire 1 refcount change on invalid ref 0 ret -22 [ 2490.425289] binder: 2601:2610 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 2490.425301] binder: 2601:2610 transaction failed 29189/-22, size 0-0 line 3013 [ 2490.470319] binder: undelivered TRANSACTION_ERROR: 29189 [ 2490.536705] audit_printk_skb: 120 callbacks suppressed [ 2490.536717] audit: type=1400 audit(1575075467.164:725): avc: denied { dac_override } for pid=2589 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2490.670546] audit: type=1400 audit(1575075467.294:726): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2491.026720] audit: type=1400 audit(1575075467.654:727): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2491.028741] audit: type=1400 audit(1575075467.654:728): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2491.152312] audit: type=1400 audit(1575075467.774:729): avc: denied { dac_override } for pid=2617 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2491.807809] audit: type=1400 audit(1575075468.434:730): avc: denied { dac_override } for pid=2617 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2491.905620] audit: type=1400 audit(1575075468.534:731): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2491.907166] audit: type=1400 audit(1575075468.534:732): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2493.165788] audit: type=1400 audit(1575075469.794:733): avc: denied { net_raw } for pid=2651 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2494.605412] audit: type=1400 audit(1575075471.234:734): avc: denied { net_raw } for pid=2679 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2495.960656] audit_printk_skb: 15 callbacks suppressed [ 2495.960665] audit: type=1400 audit(1575075472.584:740): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2495.966911] audit: type=1400 audit(1575075472.594:741): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2496.346172] audit: type=1400 audit(1575075472.974:742): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2496.874476] audit: type=1400 audit(1575075473.494:743): avc: denied { net_raw } for pid=2715 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2496.980644] audit: type=1400 audit(1575075473.604:744): avc: denied { dac_override } for pid=2715 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2497.590571] audit: type=1400 audit(1575075474.214:745): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2497.592331] audit: type=1400 audit(1575075474.214:746): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2497.719234] audit: type=1400 audit(1575075474.344:747): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2497.890020] audit: type=1400 audit(1575075474.514:748): avc: denied { net_raw } for pid=2730 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2497.909161] audit: type=1400 audit(1575075474.534:749): avc: denied { dac_override } for pid=2730 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2501.517424] audit_printk_skb: 33 callbacks suppressed [ 2501.517436] audit: type=1400 audit(1575075478.144:761): avc: denied { net_raw } for pid=2777 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2501.565431] audit: type=1400 audit(1575075478.194:762): avc: denied { dac_override } for pid=2777 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2501.912112] audit: type=1400 audit(1575075478.534:763): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2502.625767] audit: type=1400 audit(1575075479.254:764): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2503.295430] audit: type=1400 audit(1575075479.924:765): avc: denied { net_admin } for pid=2790 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2503.426317] audit: type=1400 audit(1575075480.054:766): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2503.459950] audit: type=1400 audit(1575075480.084:767): avc: denied { create } for pid=2790 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2503.460420] audit: type=1400 audit(1575075480.084:768): avc: denied { write } for pid=2790 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2503.525857] audit: type=1400 audit(1575075480.154:769): avc: denied { net_raw } for pid=2797 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2503.547422] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2792 comm=syz-executor.1 [ 2503.678063] audit: type=1400 audit(1575075480.304:770): avc: denied { read } for pid=2790 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2503.970589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2801 comm=syz-executor.1 [ 2507.136327] audit_printk_skb: 51 callbacks suppressed [ 2507.136336] audit: type=1400 audit(1575075483.764:788): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2507.199952] audit: type=1400 audit(1575075483.824:789): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2507.666171] audit: type=1400 audit(1575075484.294:790): avc: denied { net_raw } for pid=2852 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2507.695624] audit: type=1400 audit(1575075484.324:791): avc: denied { dac_override } for pid=2852 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2508.275402] audit: type=1400 audit(1575075484.904:792): avc: denied { net_raw } for pid=2860 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2508.397028] audit: type=1400 audit(1575075485.024:793): avc: denied { dac_override } for pid=2860 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2508.506388] audit: type=1400 audit(1575075485.134:794): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2508.544399] audit: type=1400 audit(1575075485.164:795): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2508.605742] audit: type=1400 audit(1575075485.224:796): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2508.610644] audit: type=1400 audit(1575075485.224:797): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2510.486517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2915 comm=syz-executor.4 [ 2511.513630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2918 comm=syz-executor.4 [ 2512.367058] audit_printk_skb: 114 callbacks suppressed [ 2512.367069] audit: type=1400 audit(1575075488.994:836): avc: denied { net_raw } for pid=2983 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2512.588323] audit: type=1400 audit(1575075489.214:837): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2512.596438] audit: type=1400 audit(1575075489.224:838): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2512.667945] audit: type=1400 audit(1575075489.294:839): avc: denied { dac_override } for pid=2983 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2512.808475] audit: type=1400 audit(1575075489.434:840): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2512.810051] audit: type=1400 audit(1575075489.434:841): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2513.156581] audit: type=1400 audit(1575075489.784:842): avc: denied { dac_override } for pid=3004 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2513.206219] audit: type=1400 audit(1575075489.834:843): avc: denied { net_raw } for pid=3008 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2513.315722] audit: type=1400 audit(1575075489.944:844): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2513.345692] audit: type=1400 audit(1575075489.974:845): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2514.427436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3041 comm=syz-executor.0 [ 2517.387196] audit_printk_skb: 57 callbacks suppressed [ 2517.387209] audit: type=1400 audit(1575075494.014:865): avc: denied { net_raw } for pid=3081 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2517.582913] audit: type=1400 audit(1575075494.204:866): avc: denied { dac_override } for pid=3078 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2517.757453] audit: type=1400 audit(1575075494.384:867): avc: denied { dac_override } for pid=3081 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2517.847317] audit: type=1400 audit(1575075494.474:868): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2517.848987] audit: type=1400 audit(1575075494.474:869): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2518.136104] audit: type=1400 audit(1575075494.764:870): avc: denied { net_raw } for pid=3094 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2518.145904] audit: type=1400 audit(1575075494.774:871): avc: denied { net_raw } for pid=3093 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2518.168014] audit: type=1400 audit(1575075494.794:872): avc: denied { dac_override } for pid=3094 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2518.505838] audit: type=1400 audit(1575075495.134:873): avc: denied { sys_admin } for pid=2061 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2518.507726] audit: type=1400 audit(1575075495.134:874): avc: denied { net_admin } for pid=2061 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2522.415683] audit_printk_skb: 45 callbacks suppressed [ 2522.415691] audit: type=1400 audit(1575075499.044:890): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2522.416211] audit: type=1400 audit(1575075499.044:891): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2522.566647] audit: type=1400 audit(1575075499.194:892): avc: denied { net_raw } for pid=3181 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2522.855907] audit: type=1400 audit(1575075499.484:893): avc: denied { net_admin } for pid=3165 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2522.876166] audit: type=1400 audit(1575075499.504:894): avc: denied { dac_override } for pid=3181 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2523.036959] audit: type=1400 audit(1575075499.664:895): avc: denied { net_raw } for pid=3187 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2523.396295] audit: type=1400 audit(1575075500.024:896): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2523.397870] audit: type=1400 audit(1575075500.024:897): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2523.407976] audit: type=1400 audit(1575075500.034:898): avc: denied { dac_override } for pid=3181 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2523.643448] audit: type=1400 audit(1575075500.264:899): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2524.431471] lowmemorykiller: Killing 'syz-executor.5' (17358) (tgid 17358), adj 1000, [ 2524.431471] to free 52556kB on behalf of 'kswapd0' (33) because [ 2524.431471] cache 63600kB is below limit 65536kB for oom_score_adj 12 [ 2524.431471] Free memory is 520kB above reserved [ 2525.572143] lowmemorykiller: Killing 'syz-executor.5' (17358) (tgid 17358), adj 1000, [ 2525.572143] to free 52556kB on behalf of 'kswapd0' (33) because [ 2525.572143] cache 63576kB is below limit 65536kB for oom_score_adj 12 [ 2525.572143] Free memory is 7096kB above reserved [ 2526.757217] lowmemorykiller: Killing 'syz-executor.5' (17358) (tgid 17358), adj 1000, [ 2526.757217] to free 52556kB on behalf of 'kswapd0' (33) because [ 2526.757217] cache 63576kB is below limit 65536kB for oom_score_adj 12 [ 2526.757217] Free memory is 17232kB above reserved [ 2527.457385] audit_printk_skb: 51 callbacks suppressed [ 2527.457394] audit: type=1400 audit(1575075504.084:917): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2527.458856] audit: type=1400 audit(1575075504.084:918): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2527.473443] audit: type=1400 audit(1575075504.094:919): avc: denied { net_raw } for pid=3262 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2527.606873] audit: type=1400 audit(1575075504.234:920): avc: denied { dac_override } for pid=3262 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2527.877104] lowmemorykiller: Killing 'syz-executor.5' (17358) (tgid 17358), adj 1000, [ 2527.877104] to free 52556kB on behalf of 'kswapd0' (33) because [ 2527.877104] cache 63576kB is below limit 65536kB for oom_score_adj 12 [ 2527.877104] Free memory is 23864kB above reserved [ 2528.055792] audit: type=1400 audit(1575075504.684:921): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2528.057077] audit: type=1400 audit(1575075504.684:922): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2528.156982] audit: type=1400 audit(1575075504.784:923): avc: denied { net_raw } for pid=3266 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2528.167785] audit: type=1400 audit(1575075504.794:924): avc: denied { dac_override } for pid=3262 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2528.620432] audit: type=1400 audit(1575075505.244:925): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2528.637250] audit: type=1400 audit(1575075505.264:926): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2532.525887] audit_printk_skb: 90 callbacks suppressed [ 2532.525900] audit: type=1400 audit(1575075509.154:957): avc: denied { read } for pid=3340 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2532.843650] audit: type=1400 audit(1575075509.464:958): avc: denied { net_admin } for pid=3340 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2532.844106] audit: type=1400 audit(1575075509.464:959): avc: denied { create } for pid=3340 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2532.844575] audit: type=1400 audit(1575075509.464:960): avc: denied { write } for pid=3340 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2532.887639] audit: type=1400 audit(1575075509.514:961): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2532.939468] audit: type=1400 audit(1575075509.564:962): avc: denied { read } for pid=3340 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2533.296318] audit: type=1400 audit(1575075509.924:963): avc: denied { net_raw } for pid=3385 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2533.436820] audit: type=1400 audit(1575075510.064:964): avc: denied { sys_admin } for pid=2061 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2533.438851] audit: type=1400 audit(1575075510.064:965): avc: denied { net_admin } for pid=2061 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2533.464781] audit: type=1400 audit(1575075510.084:966): avc: denied { dac_override } for pid=3393 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2535.114056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3415 comm=syz-executor.3 [ 2537.546054] audit_printk_skb: 75 callbacks suppressed [ 2537.546066] audit: type=1400 audit(1575075514.174:992): avc: denied { net_admin } for pid=3468 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2538.055626] audit: type=1400 audit(1575075514.684:993): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2538.336591] audit: type=1400 audit(1575075514.964:994): avc: denied { net_admin } for pid=3468 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2538.348823] audit: type=1400 audit(1575075514.974:995): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2538.655804] audit: type=1400 audit(1575075515.284:996): avc: denied { net_raw } for pid=3495 comm="syz-executor.0" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2538.747677] audit: type=1400 audit(1575075515.374:997): avc: denied { dac_override } for pid=3495 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2538.794721] audit: type=1400 audit(1575075515.414:998): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2538.796933] audit: type=1400 audit(1575075515.424:999): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2539.077963] audit: type=1400 audit(1575075515.704:1000): avc: denied { net_admin } for pid=2061 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2539.080677] audit: type=1400 audit(1575075515.704:1001): avc: denied { net_raw } for pid=3502 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2541.540736] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2542.620196] audit_printk_skb: 78 callbacks suppressed [ 2542.620205] audit: type=1400 audit(1575075519.244:1028): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2542.925827] audit: type=1400 audit(1575075519.554:1029): avc: denied { net_raw } for pid=3581 comm="syz-executor.0" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2542.995088] audit: type=1400 audit(1575075519.614:1030): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2542.997058] audit: type=1400 audit(1575075519.624:1031): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2543.129176] audit: type=1400 audit(1575075519.754:1032): avc: denied { dac_override } for pid=3581 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2543.585883] audit: type=1400 audit(1575075520.214:1033): avc: denied { sys_admin } for pid=2057 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2543.685947] audit: type=1400 audit(1575075520.314:1034): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2543.742201] audit: type=1400 audit(1575075520.364:1035): avc: denied { dac_override } for pid=3581 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2543.901104] audit: type=1400 audit(1575075520.524:1036): avc: denied { net_raw } for pid=3591 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2543.993953] audit: type=1400 audit(1575075520.614:1037): avc: denied { dac_override } for pid=3591 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2547.717776] audit_printk_skb: 63 callbacks suppressed [ 2547.717791] audit: type=1400 audit(1575075524.344:1059): avc: denied { net_raw } for pid=3667 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2547.825878] audit: type=1400 audit(1575075524.454:1060): avc: denied { dac_override } for pid=3667 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2548.096001] audit: type=1400 audit(1575075524.724:1061): avc: denied { net_admin } for pid=3671 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2548.185670] audit: type=1400 audit(1575075524.814:1062): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2548.475588] audit: type=1400 audit(1575075525.104:1063): avc: denied { create } for pid=3685 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2548.476096] audit: type=1400 audit(1575075525.104:1064): avc: denied { write } for pid=3685 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2548.570523] audit: type=1400 audit(1575075525.194:1065): avc: denied { read } for pid=3685 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2548.851099] audit: type=1400 audit(1575075525.474:1066): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2548.863103] audit: type=1400 audit(1575075525.484:1067): avc: denied { net_admin } for pid=2062 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2548.973725] audit: type=1400 audit(1575075525.594:1068): avc: denied { read } for pid=3685 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2553.212830] audit_printk_skb: 99 callbacks suppressed [ 2553.212839] audit: type=1400 audit(1575075529.834:1102): avc: denied { sys_admin } for pid=2062 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2553.464259] audit: type=1400 audit(1575075530.084:1103): avc: denied { net_admin } for pid=2057 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2553.751787] audit: type=1400 audit(1575075530.374:1104): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2553.756195] audit: type=1400 audit(1575075530.384:1105): avc: denied { net_raw } for pid=3811 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2553.857413] audit: type=1400 audit(1575075530.484:1106): avc: denied { net_raw } for pid=3813 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2553.870008] audit: type=1400 audit(1575075530.494:1107): avc: denied { dac_override } for pid=3811 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2553.878610] audit: type=1400 audit(1575075530.504:1108): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2553.880358] audit: type=1400 audit(1575075530.504:1109): avc: denied { net_admin } for pid=2060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2554.350198] audit: type=1400 audit(1575075530.974:1110): avc: denied { create } for pid=3754 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2554.350651] audit: type=1400 audit(1575075530.974:1111): avc: denied { write } for pid=3754 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2558.315362] audit_printk_skb: 36 callbacks suppressed [ 2558.315375] audit: type=1400 audit(1575075534.944:1124): avc: denied { create } for pid=3876 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2558.315977] audit: type=1400 audit(1575075534.944:1125): avc: denied { write } for pid=3876 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2558.361324] audit: type=1400 audit(1575075534.984:1126): avc: denied { read } for pid=3876 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2558.616066] audit: type=1400 audit(1575075535.244:1127): avc: denied { net_raw } for pid=3890 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2558.901966] audit: type=1400 audit(1575075535.524:1128): avc: denied { dac_override } for pid=3893 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2559.095807] audit: type=1400 audit(1575075535.724:1129): avc: denied { net_admin } for pid=3892 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2559.209512] audit: type=1400 audit(1575075535.834:1130): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2559.316326] audit: type=1400 audit(1575075535.944:1131): avc: denied { net_admin } for pid=3890 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2559.480682] audit: type=1400 audit(1575075536.104:1132): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2559.536297] audit: type=1400 audit(1575075536.164:1133): avc: denied { net_raw } for pid=3908 comm="syz-executor.0" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.586473] audit_printk_skb: 63 callbacks suppressed [ 2563.586487] audit: type=1400 audit(1575075540.214:1155): avc: denied { net_raw } for pid=3970 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.594835] audit: type=1400 audit(1575075540.214:1156): avc: denied { dac_override } for pid=3970 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.852132] audit: type=1400 audit(1575075540.474:1157): avc: denied { net_admin } for pid=3976 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2564.076900] audit: type=1400 audit(1575075540.704:1158): avc: denied { sys_admin } for pid=2060 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2564.476433] audit: type=1400 audit(1575075541.104:1159): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2564.478298] audit: type=1400 audit(1575075541.104:1160): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2564.781908] audit: type=1400 audit(1575075541.404:1161): avc: denied { net_raw } for pid=3990 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2564.795777] audit: type=1400 audit(1575075541.424:1162): avc: denied { dac_override } for pid=3990 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2564.888195] audit: type=1400 audit(1575075541.514:1163): avc: denied { dac_override } for pid=3990 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2564.949893] audit: type=1400 audit(1575075541.574:1164): avc: denied { sys_admin } for pid=5611 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2567.819218] lowmemorykiller: Killing 'syz-executor.1' (17360) (tgid 17360), adj 1000, [ 2567.819218] to free 52548kB on behalf of 'kswapd0' (33) because [ 2567.819218] cache 63580kB is below limit 65536kB for oom_score_adj 12 [ 2567.819218] Free memory is -6728kB above reserved [ 2567.821966] lowmemorykiller: Killing 'syz-executor.5' (17305) (tgid 17305), adj 1000, [ 2567.821966] to free 52480kB on behalf of 'kswapd0' (33) because [ 2567.821966] cache 63580kB is below limit 65536kB for oom_score_adj 12 [ 2567.821966] Free memory is -6728kB above reserved [ 2567.873658] lowmemorykiller: Killing 'syz-executor.5' (17318) (tgid 17318), adj 1000, [ 2567.873658] to free 52480kB on behalf of 'kswapd0' (33) because [ 2567.873658] cache 63480kB is below limit 65536kB for oom_score_adj 12 [ 2567.873658] Free memory is -6328kB above reserved [ 2567.941020] lowmemorykiller: Killing 'syz-executor.2' (4701) (tgid 4701), adj 1000, [ 2567.941020] to free 52456kB on behalf of 'kswapd0' (33) because [ 2567.941020] cache 63280kB is below limit 65536kB for oom_score_adj 12 [ 2567.941020] Free memory is 14264kB above reserved [ 2567.943520] lowmemorykiller: Killing 'syz-executor.5' (22832) (tgid 22832), adj 1000, [ 2567.943520] to free 52452kB on behalf of 'kswapd0' (33) because [ 2567.943520] cache 63380kB is below limit 65536kB for oom_score_adj 12 [ 2567.943520] Free memory is 25132kB above reserved [ 2568.656154] audit_printk_skb: 69 callbacks suppressed [ 2568.656166] audit: type=1400 audit(1575075545.284:1188): avc: denied { dac_override } for pid=4069 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2568.661192] audit: type=1400 audit(1575075545.284:1189): avc: denied { net_raw } for pid=4071 comm="syz-executor.0" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.214211] audit: type=1400 audit(1575075545.834:1190): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.215715] audit: type=1400 audit(1575075545.844:1191): avc: denied { net_admin } for pid=2059 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.704590] audit: type=1400 audit(1575075546.324:1192): avc: denied { net_raw } for pid=4089 comm="syz-executor.2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.714369] audit: type=1400 audit(1575075546.334:1193): avc: denied { dac_override } for pid=4089 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2570.106424] audit: type=1400 audit(1575075546.734:1194): avc: denied { net_raw } for pid=4098 comm="syz-executor.0" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2570.306159] audit: type=1400 audit(1575075546.934:1195): avc: denied { net_admin } for pid=4098 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2570.426295] audit: type=1400 audit(1575075547.054:1196): avc: denied { dac_override } for pid=4102 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2570.883007] audit: type=1400 audit(1575075547.504:1197): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.078361] audit_printk_skb: 36 callbacks suppressed [ 2574.078369] audit: type=1400 audit(1575075550.704:1210): avc: denied { net_admin } for pid=5611 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.081323] audit: type=1400 audit(1575075550.704:1211): avc: denied { sys_admin } for pid=2059 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2579.785425] INFO: task init:878 blocked for more than 140 seconds. [ 2579.785430] Not tainted 4.9.141+ #1 [ 2579.785433] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2579.785453] init D29336 878 1 0x00000000 [ 2579.785470] ffff880025365f00 ffff8801c7fec200 ffff8801d3f37900 ffff88015fb8c740 [ 2579.785481] ffff8801db621018 ffff88006015f738 ffffffff828075c2 0000000000000000 [ 2579.785492] ffff8800253667b0 ffffed0004a6ccf5 00ff880025365f00 ffff8801db6218f0 [ 2579.785493] Call Trace: [ 2579.785510] [] ? __schedule+0x662/0x1b10 [ 2579.785518] [] schedule+0x7f/0x1b0 [ 2579.785526] [] schedule_preempt_disabled+0x13/0x20 [ 2579.785534] [] mutex_lock_nested+0x38d/0x900 [ 2579.785543] [] ? tty_open+0x476/0xdf0 [ 2579.785551] [] ? mutex_trylock+0x3e0/0x3e0 [ 2579.785561] [] ? kmem_cache_alloc_trace+0x117/0x2e0 [ 2579.785569] [] tty_open+0x476/0xdf0 [ 2579.785576] [] ? tty_init_dev+0x430/0x430 [ 2579.785584] [] ? chrdev_open+0xc7/0x5c0 [ 2579.785594] [] ? do_raw_spin_unlock+0x135/0x210 [ 2579.785601] [] ? tty_init_dev+0x430/0x430 [ 2579.785608] [] chrdev_open+0x22d/0x5c0 [ 2579.785616] [] ? cdev_put.part.0+0x50/0x50 [ 2579.785625] [] do_dentry_open+0x3ef/0xc90 [ 2579.785633] [] ? cdev_put.part.0+0x50/0x50 [ 2579.785641] [] vfs_open+0x11c/0x210 [ 2579.785648] [] ? may_open.isra.20+0x14f/0x2a0 [ 2579.785656] [] path_openat+0x542/0x2790 [ 2579.785664] [] ? path_mountpoint+0x6c0/0x6c0 [ 2579.785672] [] ? trace_hardirqs_on+0x10/0x10 [ 2579.785681] [] ? expand_files.part.3+0x3a9/0x6d0 [ 2579.785688] [] do_filp_open+0x197/0x270 [ 2579.785696] [] ? may_open_dev+0xe0/0xe0 [ 2579.785703] [] ? _raw_spin_unlock+0x2c/0x50 [ 2579.785711] [] ? __alloc_fd+0x1d7/0x4a0 [ 2579.785719] [] do_sys_open+0x30d/0x5c0 [ 2579.785736] [] ? filp_open+0x70/0x70 [ 2579.785743] [] ? _raw_write_unlock_irq+0x27/0x50 [ 2579.785752] [] SyS_open+0x2d/0x40 [ 2579.785759] [] ? do_sys_open+0x5c0/0x5c0 [ 2579.785767] [] do_syscall_64+0x19f/0x550 [ 2579.785775] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2579.785778] [ 2579.785778] Showing all locks held in the system: [ 2579.785787] 2 locks held by khungtaskd/24: [ 2579.785804] #0: (rcu_read_lock){......}, at: [] watchdog+0x310/0xa20 [ 2579.785820] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 2579.785830] 1 lock held by rsyslogd/1892: [ 2579.785844] #0: (&f->f_pos_lock){+.+.+.}, at: [] __fdget_pos+0xac/0xd0 [ 2579.785848] 2 locks held by getty/2019: [ 2579.785862] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 2579.785876] #1: (&ldata->atomic_read_lock){+.+.+.}, at: [] n_tty_read+0x202/0x16e0 [ 2579.786001] 2 locks held by syz-executor.4/23943: [ 2579.786016] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 2579.786029] #1: (&ldata->atomic_read_lock){+.+.+.}, at: [] n_tty_read+0x202/0x16e0 [ 2579.786057] 1 lock held by init/878: [ 2579.786069] #0: (tty_mutex){+.+.+.}, at: [] tty_open+0x476/0xdf0 [ 2579.786073] 1 lock held by init/879: [ 2579.786086] #0: (tty_mutex){+.+.+.}, at: [] tty_open+0x476/0xdf0 [ 2579.786090] 1 lock held by init/880: [ 2579.786102] #0: (tty_mutex){+.+.+.}, at: [] tty_open+0x476/0xdf0 [ 2579.786106] 1 lock held by init/881: [ 2579.786118] #0: (tty_mutex){+.+.+.}, at: [] tty_open+0x476/0xdf0 [ 2579.786122] 1 lock held by init/882: [ 2579.786135] #0: (tty_mutex){+.+.+.}, at: [] tty_open+0x476/0xdf0 [ 2579.786138] 1 lock held by init/883: [ 2579.786151] #0: (tty_mutex){+.+.+.}, at: [] tty_open+0x476/0xdf0 [ 2579.786171] 1 lock held by syz-executor.1/4082: [ 2579.786185] #0: (tty_mutex){+.+.+.}, at: [] ptmx_open+0xf7/0x310 [ 2579.786189] 1 lock held by syz-executor.1/4085: [ 2579.786202] #0: (tty_mutex){+.+.+.}, at: [] ptmx_open+0xf7/0x310 [ 2579.786204] [ 2579.786206] ============================================= [ 2579.786206] [ 2579.786210] NMI backtrace for cpu 0 [ 2579.786217] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.141+ #1 [ 2579.786228] ffff8801d9907d08 ffffffff81b42e79 0000000000000000 0000000000000000 [ 2579.786237] 0000000000000000 0000000000000001 ffffffff810983b0 ffff8801d9907d40 [ 2579.786246] ffffffff81b4df89 0000000000000000 0000000000000000 0000000000000002 [ 2579.786248] Call Trace: [ 2579.786258] [] dump_stack+0xc1/0x128 [ 2579.786268] [] ? irq_force_complete_move+0x330/0x330 [ 2579.786275] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 2579.786283] [] ? irq_force_complete_move+0x330/0x330 [ 2579.786291] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 2579.786300] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2579.786306] [] watchdog+0x6ad/0xa20 [ 2579.786313] [] ? watchdog+0x310/0xa20 [ 2579.786322] [] kthread+0x26d/0x300 [ 2579.786330] [] ? reset_hung_task_detector+0x20/0x20 [ 2579.786337] [] ? kthread_park+0xa0/0xa0 [ 2579.786345] [] ? __switch_to_asm+0x34/0x70 [ 2579.786352] [] ? kthread_park+0xa0/0xa0 [ 2579.786359] [] ? kthread_park+0xa0/0xa0 [ 2579.786366] [] ret_from_fork+0x5c/0x70 [ 2579.786372] Sending NMI from CPU 0 to CPUs 1: [ 2579.786655] NMI backtrace for cpu 1 [ 2579.786658] CPU: 1 PID: 27935 Comm: syz-executor.4 Not tainted 4.9.141+ #1 [ 2579.786661] task: ffff88014a7edf00 task.stack: ffff880093d98000 [ 2579.786664] RIP: 0010:[] c [] __sanitizer_cov_trace_pc+0x1/0x50 [ 2579.786666] RSP: 0018:ffff880093d9fa58 EFLAGS: 00000202 [ 2579.786668] RAX: ffff88014a7edf00 RBX: ffff880117b0e200 RCX: 000000007d261080 [ 2579.786671] RDX: 0000000000000000 RSI: ffffffff81a033c0 RDI: ffff88014a7ee7ac [ 2579.786673] RBP: ffff880093d9fa98 R08: 0000000000000000 R09: 0000000000000000 [ 2579.786676] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000004 [ 2579.786678] R13: ffff8801d716d060 R14: ffff880117b0e220 R15: ffff880185572bc8 [ 2579.786681] FS: 00007fb80aa0f700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 2579.786683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2579.786686] CR2: 000000000174d978 CR3: 00000000a3863000 CR4: 00000000001606b0 [ 2579.786688] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2579.786691] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2579.786692] Stack: [ 2579.786695] ffff880093d9fa98c ffffffff81a0343cc ffff88014a7edf00c ffffffff831cc320c [ 2579.786698] dffffc0000000000c ffff880117b0e200c 0000000000000004c 0000000000000000c [ 2579.786701] ffff880093d9fad0c ffffffff819e5453c 0000000000000000c 0000000000000004c [ 2579.786702] Call Trace: [ 2579.786705] [] ? selinux_file_permission+0x9c/0x470 [ 2579.786707] [] security_file_permission+0x83/0x1e0 [ 2579.786709] [] rw_verify_area+0xde/0x2a0 [ 2579.786712] [] do_splice_to+0x79/0x170 [ 2579.786714] [] splice_direct_to_actor+0x23f/0x7e0 [ 2579.786716] [] ? pipe_to_sendpage+0x330/0x330 [ 2579.786719] [] ? do_splice_to+0x170/0x170 [ 2579.786721] [] ? security_file_permission+0x8f/0x1e0 [ 2579.786723] [] ? rw_verify_area+0xe5/0x2a0 [ 2579.786726] [] do_splice_direct+0x1a3/0x270 [ 2579.786728] [] ? splice_direct_to_actor+0x7e0/0x7e0 [ 2579.786731] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2579.786733] [] ? __sb_start_write+0x161/0x300 [ 2579.786735] [] do_sendfile+0x4f0/0xc30 [ 2579.786738] [] ? do_compat_pwritev64+0x180/0x180 [ 2579.786740] [] ? __might_fault+0x114/0x1d0 [ 2579.786742] [] SyS_sendfile64+0xd1/0x160 [ 2579.786744] [] ? SyS_sendfile+0x160/0x160 [ 2579.786746] [] ? do_syscall_64+0x48/0x550 [ 2579.786749] [] ? SyS_sendfile+0x160/0x160 [ 2579.786751] [] do_syscall_64+0x19f/0x550 [ 2579.786753] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2579.786761] Code: c26 c76 c1d c00 c48 c8b c75 cc8 ce9 cc3 cfe cff cff c4c c89 cff ce8 c15 c76 c1d c00 ce9 c9e cfe cff cff c4c c89 ce7 ce8 c08 c76 c1d c00 ce9 c23 cfe cff cff c0f c1f c00 c55 c<48> c89 ce5 c48 c8b c75 c08 c65 c48 c8b c04 c25 c00 c7e c01 c00 c65 c8b c15 c18 cc3 c [ 2579.787388] Kernel panic - not syncing: hung_task: blocked tasks [ 2579.787394] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.141+ #1 [ 2579.787406] ffff8801d9907cc8 ffffffff81b42e79 ffffffff82a78560 00000000ffffffff [ 2579.787415] 0000000000000000 0000000000000000 dffffc0000000000 ffff8801d9907d88 [ 2579.787425] ffffffff813f7125 0000000041b58ab3 ffffffff82e2b62b ffffffff813f6f66 [ 2579.787427] Call Trace: [ 2579.787435] [] dump_stack+0xc1/0x128 [ 2579.787442] [] panic+0x1bf/0x39f [ 2579.787450] [] ? add_taint.cold.5+0x16/0x16 [ 2579.787458] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 2579.787465] [] watchdog+0x6be/0xa20 [ 2579.787472] [] ? watchdog+0x310/0xa20 [ 2579.787479] [] kthread+0x26d/0x300 [ 2579.787486] [] ? reset_hung_task_detector+0x20/0x20 [ 2579.787493] [] ? kthread_park+0xa0/0xa0 [ 2579.787501] [] ? __switch_to_asm+0x34/0x70 [ 2579.787508] [] ? kthread_park+0xa0/0xa0 [ 2579.787515] [] ? kthread_park+0xa0/0xa0 [ 2579.787522] [] ret_from_fork+0x5c/0x70 [ 2579.787976] Kernel Offset: disabled