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", 0x1000}, 0x1006) 19:52:21 executing program 3: ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x0) set_thread_area(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffff000, 0xfffffffffffffffb}) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) 19:52:21 executing program 3: ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x0) set_thread_area(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffff000, 0xfffffffffffffffb}) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) 19:52:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x0) set_thread_area(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffff000, 0xfffffffffffffffb}) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846eab1a9d914b0695b16dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1a375b63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c128cf35ddf4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7912ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6692ceb4831b5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8297cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057288d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858ae38ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d294285497a42736454ccb62fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) 19:52:21 executing program 4: sched_setaffinity(0x0, 0x3bd, &(0x7f00000002c0)=0x3ffffffffffffff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) r0 = socket(0x10, 0x3, 0x2) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000004c0)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={"69705f76746930000000ed2e5f4800", @ifru_ivalue}) connect(r0, &(0x7f0000000600)=@nfc_llcp={0x27, 0x0, 0x1, 0x0, 0x0, 0x10000, "cb8e0d07c253a9bf17d5e712ef84325439b43c33bc7357e2021a6b69007a43d2461309259300b21d5dc708ae9b6980cc8687fb7dc52e2698df0a790c315d38", 0x20}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000380)=0x1002, 0x4) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000002, &(0x7f0000000200)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='ip_vti0\x00', 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000580)={0xc, 0x4000200000002, 0x20000007}) getsockname$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x1c) sendto$inet(r1, &(0x7f0000d7cfcb), 0x100000252, 0x0, &(0x7f0000893ff0), 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000000000ff0000000003000600fc00000002000004000000bb000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400000000000117, 0x0) 19:52:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x0) set_thread_area(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffff000, 0xfffffffffffffffb}) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846eab1a9d914b0695b16dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1a375b63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c128cf35ddf4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7912ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6692ceb4831b5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8297cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057288d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858ae38ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d294285497a42736454ccb62fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) 19:52:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3021, 0x0) 19:52:21 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3021, 0x0) 19:52:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3021, 0x0) 19:52:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000040)=@objname={'system_u:object_r:devicekit_var_run_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0xffffffff00000000, 0x20, './file0\x00'}, 0x74) 19:52:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3021, 0x0) 19:52:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000040)=@objname={'system_u:object_r:devicekit_var_run_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0xffffffff00000000, 0x20, './file0\x00'}, 0x74) 19:52:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3021, 0x0) 19:52:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3021, 0x0) 19:52:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000040)=@objname={'system_u:object_r:devicekit_var_run_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0xffffffff00000000, 0x20, './file0\x00'}, 0x74) 19:52:22 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:22 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) 19:52:22 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc018620c, 0x8000cd) [ 324.874849] binder: 19424:19427 ioctl c018620c 8000cd returned -1 [ 324.888262] binder: 19424:19430 ioctl c018620c 8000cd returned -1 19:52:22 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:22 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3021, 0x0) 19:52:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000040)=@objname={'system_u:object_r:devicekit_var_run_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0xffffffff00000000, 0x20, './file0\x00'}, 0x74) 19:52:22 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:22 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc018620c, 0x8000cd) 19:52:22 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) 19:52:22 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:22 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:22 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) [ 325.062234] binder: 19438:19441 ioctl c018620c 8000cd returned -1 19:52:22 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc018620c, 0x8000cd) 19:52:22 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:22 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) [ 325.167462] binder: 19460:19463 ioctl c018620c 8000cd returned -1 19:52:23 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:23 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc018620c, 0x8000cd) 19:52:23 executing program 0: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:23 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) 19:52:23 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:23 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) [ 325.906221] binder: 19481:19487 ioctl c018620c 8000cd returned -1 [ 325.910965] kauditd_printk_skb: 85 callbacks suppressed [ 325.910973] audit: type=1400 audit(1543002743.321:2715): avc: denied { map } for pid=19484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 325.969975] audit: type=1400 audit(1543002743.381:2716): avc: denied { map } for pid=19491 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:23 executing program 2: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) [ 326.003654] audit: type=1400 audit(1543002743.421:2717): avc: denied { map } for pid=19494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 326.035995] audit: type=1400 audit(1543002743.451:2718): avc: denied { map } for pid=19500 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:23 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) [ 326.076281] audit: type=1400 audit(1543002743.491:2719): avc: denied { map } for pid=19506 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:23 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) [ 326.185689] audit: type=1400 audit(1543002743.601:2720): avc: denied { map } for pid=19515 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:23 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) [ 326.315104] audit: type=1400 audit(1543002743.731:2721): avc: denied { map } for pid=19520 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:23 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) [ 326.407215] audit: type=1400 audit(1543002743.821:2722): avc: denied { map } for pid=19524 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:23 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) [ 326.503435] audit: type=1400 audit(1543002743.921:2723): avc: denied { map } for pid=19526 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 326.613472] audit: type=1400 audit(1543002744.031:2724): avc: denied { map } for pid=19529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:24 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:24 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x40000000000021b, 0x0) 19:52:24 executing program 0: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:24 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:24 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:24 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:24 executing program 2: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:24 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:24 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:24 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:24 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:24 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x3, &(0x7f0000000200)=ANY=[]) unlink(&(0x7f0000000000)='./file0/file0\x00') 19:52:25 executing program 0: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:25 executing program 4: clone(0x3502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) ptrace$cont(0x18, r0, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x28}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:52:25 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:25 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) sendto$inet6(r1, 0x0, 0x2e4, 0x100000020000008, &(0x7f0000000000), 0x1c) 19:52:25 executing program 4: clone(0x3502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) ptrace$cont(0x18, r0, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x28}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:52:25 executing program 2: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x800000000000004, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 19:52:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) sendto$inet6(r1, 0x0, 0x2e4, 0x100000020000008, &(0x7f0000000000), 0x1c) 19:52:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) sendto$inet6(r1, 0x0, 0x2e4, 0x100000020000008, &(0x7f0000000000), 0x1c) 19:52:25 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) sendto$inet6(r1, 0x0, 0x2e4, 0x100000020000008, &(0x7f0000000000), 0x1c) [ 327.723472] binder: 19591:19593 ioctl 40046207 0 returned -13 [ 327.741706] binder: 19591:19593 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:25 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 327.822575] binder: 19591:19593 ioctl 40046207 0 returned -13 [ 327.829328] binder: 19591:19635 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 327.840457] binder: undelivered TRANSACTION_ERROR: 29189 [ 327.857432] binder: undelivered TRANSACTION_ERROR: 29189 19:52:25 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:25 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:25 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:25 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:25 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 328.491324] binder: 19649:19650 ioctl 40046207 0 returned -13 [ 328.504772] binder: 19657:19658 ioctl 40046207 0 returned -13 [ 328.520236] binder: 19657:19658 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 328.538809] binder: undelivered TRANSACTION_ERROR: 29189 [ 328.540311] binder: 19649:19650 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 328.554674] binder: undelivered TRANSACTION_ERROR: 29189 19:52:28 executing program 4: clone(0x3502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) ptrace$cont(0x18, r0, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x28}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:52:28 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:28 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:28 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:28 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:28 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:28 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 330.815067] binder: 19674:19681 ioctl 40046207 0 returned -13 [ 330.825411] binder: 19677:19680 ioctl 40046207 0 returned -13 [ 330.832147] binder: 19676:19685 ioctl 40046207 0 returned -13 [ 330.860993] binder: 19674:19681 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 330.872327] binder: 19677:19680 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 330.880992] binder: 19675:19684 ioctl 40046207 0 returned -13 [ 330.893226] binder: 19676:19685 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 330.899000] binder: undelivered TRANSACTION_ERROR: 29189 19:52:28 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:28 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:28 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:28 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 330.903252] binder: undelivered TRANSACTION_ERROR: 29189 [ 330.915244] binder: 19675:19684 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 330.930715] kauditd_printk_skb: 68 callbacks suppressed [ 330.930724] audit: type=1400 audit(1543002748.351:2793): avc: denied { set_context_mgr } for pid=19692 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=0 19:52:28 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 330.930781] binder: 19692:19693 ioctl 40046207 0 returned -13 [ 330.933180] binder: 19692:19693 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 330.934048] binder: undelivered TRANSACTION_ERROR: 29189 [ 330.946012] binder: undelivered TRANSACTION_ERROR: 29189 [ 330.961156] binder: undelivered TRANSACTION_ERROR: 29189 [ 331.033104] audit: type=1400 audit(1543002748.451:2794): avc: denied { map } for pid=19695 comm="syz-executor0" path="/dev/binder0" dev="devtmpfs" ino=5425 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=0 [ 331.091754] audit: type=1400 audit(1543002748.481:2795): avc: denied { map } for pid=19694 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 331.115370] audit: type=1400 audit(1543002748.491:2796): avc: denied { map } for pid=19705 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 331.131913] binder: 19695:19696 ioctl 40046207 0 returned -13 [ 331.143569] audit: type=1400 audit(1543002748.501:2797): avc: denied { map } for pid=19706 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 331.161616] binder: 19695:19696 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 331.164679] binder: 19702:19708 ioctl 40046207 0 returned -13 [ 331.169756] binder: 19701:19707 ioctl 40046207 0 returned -13 [ 331.173943] binder: 19698:19700 ioctl 40046207 0 returned -13 [ 331.174171] binder: undelivered TRANSACTION_ERROR: 29189 [ 331.178283] binder: 19697:19699 ioctl 40046207 0 returned -13 [ 331.180572] binder: 19702:19708 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 331.181760] binder: 19701:19707 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 331.183175] binder: 19698:19700 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 331.185626] binder: 19697:19699 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 331.187122] binder: undelivered TRANSACTION_ERROR: 29189 [ 331.189735] binder: undelivered TRANSACTION_ERROR: 29189 [ 331.193327] binder: undelivered TRANSACTION_ERROR: 29189 [ 331.194597] binder: undelivered TRANSACTION_ERROR: 29189 [ 331.266962] audit: type=1400 audit(1543002748.501:2798): avc: denied { map } for pid=19704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 331.289055] audit: type=1400 audit(1543002748.511:2799): avc: denied { map } for pid=19703 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 331.311141] audit: type=1400 audit(1543002748.541:2800): avc: denied { set_context_mgr } for pid=19695 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=0 [ 331.334637] audit: type=1400 audit(1543002748.571:2801): avc: denied { map } for pid=19702 comm="syz-executor2" path="/dev/binder0" dev="devtmpfs" ino=5425 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=0 [ 331.359693] audit: type=1400 audit(1543002748.571:2802): avc: denied { map } for pid=19701 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=5425 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=0 19:52:31 executing program 4: clone(0x3502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) ptrace$cont(0x18, r0, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x28}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:52:31 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 333.877731] binder: 19717:19722 ioctl 40046207 0 returned -13 [ 333.887898] binder: 19719:19723 ioctl 40046207 0 returned -13 [ 333.899442] binder: 19715:19724 ioctl 40046207 0 returned -13 [ 333.902288] binder: 19719:19723 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 333.903048] binder: 19717:19722 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:31 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 333.904589] binder: undelivered TRANSACTION_ERROR: 29189 [ 333.905162] binder: undelivered TRANSACTION_ERROR: 29189 [ 333.940892] binder: 19716:19720 ioctl 40046207 0 returned -13 [ 333.950509] binder: 19729:19730 ioctl 40046207 0 returned -13 [ 333.954307] binder: 19714:19718 ioctl 40046207 0 returned -13 [ 333.962184] binder: 19714:19718 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 333.963032] binder: undelivered TRANSACTION_ERROR: 29189 19:52:31 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 333.970768] binder: 19716:19720 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 333.971656] binder: undelivered TRANSACTION_ERROR: 29189 [ 333.984425] binder: 19715:19724 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 333.986203] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.142248] binder: 19739:19745 ioctl 40046207 0 returned -13 [ 334.153782] binder: 19736:19744 ioctl 40046207 0 returned -13 [ 334.155722] binder: 19735:19742 ioctl 40046207 0 returned -13 [ 334.157947] binder: 19731:19741 ioctl 40046207 0 returned -13 [ 334.161978] binder: 19737:19743 ioctl 40046207 0 returned -13 [ 334.166039] binder: 19735:19742 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:31 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 334.166331] binder: 19731:19741 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.167260] binder: 19729:19730 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.168326] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.169499] binder: 19737:19743 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.172799] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.173288] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.173341] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.222016] binder: 19739:19745 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.222937] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.264165] binder: 19736:19744 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.292300] binder: undelivered TRANSACTION_ERROR: 29189 19:52:31 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 334.409320] binder: 19754:19757 ioctl 40046207 0 returned -13 [ 334.421396] binder: 19756:19759 ioctl 40046207 0 returned -13 [ 334.423267] binder: 19755:19758 ioctl 40046207 0 returned -13 [ 334.425353] binder: 19755:19758 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.426204] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.431236] binder: 19754:19757 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:31 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:31 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 334.432034] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.453886] binder: 19752:19760 ioctl 40046207 0 returned -13 [ 334.456720] binder: 19752:19760 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.457556] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.481642] binder: 19746:19748 ioctl 40046207 0 returned -13 [ 334.484002] binder: 19746:19748 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.484927] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.526345] binder: 19756:19759 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.633488] binder: 19761:19763 ioctl 40046207 0 returned -13 [ 334.651308] binder: 19771:19775 ioctl 40046207 0 returned -13 [ 334.656804] binder: 19768:19770 ioctl 40046207 0 returned -13 [ 334.658795] binder: 19768:19770 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.661304] binder: 19769:19773 ioctl 40046207 0 returned -13 19:52:32 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:32 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:32 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:32 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 334.663550] binder: 19761:19763 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.664924] binder: 19769:19773 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.667091] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.667234] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.669851] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.705597] binder: 19772:19776 ioctl 40046207 0 returned -13 [ 334.707828] binder: 19772:19776 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:32 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 334.708767] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.720356] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.754259] binder: 19771:19775 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.876463] binder: 19784:19791 ioctl 40046207 0 returned -13 [ 334.898365] binder: 19781:19790 ioctl 40046207 0 returned -13 [ 334.909653] binder: 19783:19788 ioctl 40046207 0 returned -13 [ 334.909696] binder: 19784:19791 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:32 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:32 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:32 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 334.913081] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.916767] binder: 19781:19790 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.918792] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.943038] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.955727] binder: 19780:19787 ioctl 40046207 0 returned -13 [ 334.965151] binder: 19785:19789 ioctl 40046207 0 returned -13 19:52:32 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:32 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 334.965303] binder: 19780:19787 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.970754] binder: undelivered TRANSACTION_ERROR: 29189 [ 334.985244] binder: 19783:19788 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 334.985998] binder: undelivered TRANSACTION_ERROR: 29189 19:52:32 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 335.097134] binder: 19785:19803 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:32 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 335.143199] binder: 19792:19804 ioctl 40046207 0 returned -13 [ 335.169485] binder: 19792:19804 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 335.176257] binder: 19793:19794 ioctl 40046207 0 returned -13 [ 335.179350] binder: 19797:19806 ioctl 40046207 0 returned -13 19:52:32 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 335.183694] binder: 19793:19794 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 335.184537] binder: 19797:19806 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 335.187595] binder: undelivered TRANSACTION_ERROR: 29189 [ 335.188421] binder: undelivered TRANSACTION_ERROR: 29189 19:52:32 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) [ 335.238938] binder: undelivered TRANSACTION_ERROR: 29189 19:52:32 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 335.265272] binder: undelivered TRANSACTION_ERROR: 29189 19:52:32 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:32 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:32 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 335.458649] binder: 19842:19849 ioctl 40046207 0 returned -13 [ 335.489653] binder: 19842:19849 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 19:52:32 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:33 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 335.542439] binder: undelivered TRANSACTION_ERROR: 29189 [ 335.569879] binder: 19866:19874 ioctl 40046207 0 returned -13 19:52:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) sendto$inet6(r1, 0x0, 0x2e4, 0x100000020000008, &(0x7f0000000000), 0x1c) 19:52:33 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 335.706493] binder: 19866:19874 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 335.712695] binder: 19900:19904 ioctl 40046207 0 returned -13 [ 335.715010] binder: 19900:19904 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 335.715848] binder: undelivered TRANSACTION_ERROR: 29189 19:52:33 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1000) r3 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x122) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r3, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000001400)=ANY=[@ANYBLOB="ad362e5b1b5793e7a8cee2f0664e8e505fffe754f6f2bb899324c1b971d6b51b293472628fc3668dce7dcb5573ddc47478a3ab27388d54a3bbcc280000000000000000000000000000a4f94b34567eaac6551fcc0f527ea76c6f33f341d655796aa075bfa58b43ae40881a6e203e"], 0x1) r7 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80010, r8, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000013c0)) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x19, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000000000005c49"], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000480)="f2"}) 19:52:33 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) sendto$inet6(r1, 0x0, 0x2e4, 0x100000020000008, &(0x7f0000000000), 0x1c) 19:52:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:33 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) sendto$inet6(r1, 0x0, 0x2e4, 0x100000020000008, &(0x7f0000000000), 0x1c) [ 335.756549] binder: undelivered TRANSACTION_ERROR: 29189 19:52:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:33 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:33 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x2, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000480)='/dev/keychord\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x1, 0x1}, 0x800}}, 0x18) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) write$P9_RWALK(r2, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x4, 0x3}, {0x3f, 0x0, 0x5}, {}, {0x8, 0x0, 0x8}, {0xb0, 0x4, 0x7}, {0x35, 0x4, 0x5}]}}, 0x57) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/102) setresuid(0x0, r4, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 19:52:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) [ 335.940744] kauditd_printk_skb: 168 callbacks suppressed [ 335.940753] audit: type=1400 audit(1543002753.351:2971): avc: denied { map } for pid=19953 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 335.952428] binder: 19940:19941 ioctl 40046207 0 returned -13 [ 335.955040] binder: 19940:19941 transaction failed 29189/-22, size 21474836480-7567173376968491008 line 3012 [ 335.955987] binder: undelivered TRANSACTION_ERROR: 29189 [ 335.994875] audit: type=1400 audit(1543002753.361:2972): avc: denied { map } for pid=19940 comm="syz-executor4" path="/dev/binder0" dev="devtmpfs" ino=5425 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=0 [ 336.022057] audit: type=1400 audit(1543002753.361:2973): avc: denied { set_context_mgr } for pid=19940 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=0 [ 336.047949] audit: type=1400 audit(1543002753.391:2974): avc: denied { map } for pid=19954 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 336.072956] audit: type=1400 audit(1543002753.401:2975): avc: denied { map } for pid=19956 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 336.095306] audit: type=1400 audit(1543002753.401:2976): avc: denied { map } for pid=19958 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 336.122757] audit: type=1400 audit(1543002753.441:2977): avc: denied { map } for pid=19961 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 336.144862] audit: type=1400 audit(1543002753.451:2978): avc: denied { map } for pid=19963 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 336.167093] audit: type=1400 audit(1543002753.451:2979): avc: denied { map } for pid=19962 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 336.189339] audit: type=1400 audit(1543002753.481:2980): avc: denied { map } for pid=19964 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:33 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x925, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 19:52:33 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0xc020660b, 0x730200) 19:52:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x925, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 19:52:34 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0xc020660b, 0x730200) 19:52:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x925, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 19:52:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 19:52:34 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x925, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 19:52:34 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0xc020660b, 0x730200) 19:52:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x925, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 19:52:34 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0xc020660b, 0x730200) 19:52:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x925, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 19:52:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x925, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x1}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 19:52:34 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0xc020660b, 0x730200) 19:52:34 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0xc020660b, 0x730200) 19:52:34 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0xc020660b, 0x730200) 19:52:34 executing program 2: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:34 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x4) 19:52:34 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000240)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000400ef69317200afdc1338d54400009b84136e085bfb83de448daa7227c4eca815ab91d40000000431000000000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:34 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) sendmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) dup3(r1, r0, 0x0) 19:52:34 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000240)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000400ef69317200afdc1338d54400009b84136e085bfb83de448daa7227c4eca815ab91d40000000431000000000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:34 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='binfmt_misc\x00', 0x80000, &(0x7f0000000740)='$\\\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 19:52:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) sendmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) dup3(r1, r0, 0x0) 19:52:34 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x4) 19:52:34 executing program 2: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) sendmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) dup3(r1, r0, 0x0) 19:52:34 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000240)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000400ef69317200afdc1338d54400009b84136e085bfb83de448daa7227c4eca815ab91d40000000431000000000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) sendmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) dup3(r1, r0, 0x0) 19:52:34 executing program 3: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:34 executing program 1: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:34 executing program 2: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:34 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000240)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000400ef69317200afdc1338d54400009b84136e085bfb83de448daa7227c4eca815ab91d40000000431000000000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:34 executing program 0: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:34 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x4) 19:52:35 executing program 4: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x4) 19:52:35 executing program 1: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 3: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 2: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 0: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) sendmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) dup3(r1, r0, 0x0) 19:52:35 executing program 4: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) sendmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) dup3(r1, r0, 0x0) 19:52:35 executing program 1: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 3: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) sendmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) dup3(r1, r0, 0x0) 19:52:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000840)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x200}], 0x1, &(0x7f0000001580)}, 0x0) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='securityfs\x00', 0x100021, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:52:35 executing program 0: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 4: io_setup(0x6, &(0x7f0000000200)) io_setup(0x8, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f0000000380)) io_destroy(r0) io_setup(0x200, &(0x7f0000000440)) 19:52:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000), 0xc, &(0x7f00005a6ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) [ 337.951098] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&ç" or missing value 19:52:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x1000000}, 0x1c) 19:52:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000840)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x200}], 0x1, &(0x7f0000001580)}, 0x0) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='securityfs\x00', 0x100021, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 337.992368] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&ç" or missing value 19:52:35 executing program 3: socket$inet(0x10, 0x3, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x200004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:52:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x17, 0x0, 0x0, 0x7000000}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) [ 338.084795] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&ç" or missing value 19:52:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000840)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x200}], 0x1, &(0x7f0000001580)}, 0x0) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='securityfs\x00', 0x100021, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:52:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x1000000}, 0x1c) 19:52:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 19:52:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 338.290975] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&ç" or missing value 19:52:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x1000000}, 0x1c) 19:52:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000840)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x200}], 0x1, &(0x7f0000001580)}, 0x0) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='securityfs\x00', 0x100021, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 338.487509] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&ç" or missing value 19:52:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 19:52:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x1000000}, 0x1c) 19:52:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 19:52:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 19:52:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 19:52:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 19:52:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000007, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x5300}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:52:37 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) socketpair(0xf, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000540)=0x14) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000007700), &(0x7f0000007740)=0x14) 19:52:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x74}]}, &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0x14e, &(0x7f00001a7f05)=""/251}, 0x48) 19:52:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 19:52:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:37 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={"65716c000000a95b00", @ifru_map={0x1ff}}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 19:52:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 19:52:38 executing program 3: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:52:38 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:38 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={"65716c000000a95b00", @ifru_map={0x1ff}}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 19:52:38 executing program 3: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:52:38 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:38 executing program 1: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:52:38 executing program 3: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:52:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={"65716c000000a95b00", @ifru_map={0x1ff}}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) [ 340.962860] kauditd_printk_skb: 219 callbacks suppressed [ 340.962869] audit: type=1400 audit(1543002758.381:3200): avc: denied { block_suspend } for pid=20389 comm="syz-executor2" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 19:52:38 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:38 executing program 1: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:52:38 executing program 3: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:52:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={"65716c000000a95b00", @ifru_map={0x1ff}}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) [ 341.060154] audit: type=1400 audit(1543002758.381:3201): avc: denied { map } for pid=20441 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:38 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:38 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 341.101355] audit: type=1400 audit(1543002758.391:3202): avc: denied { map } for pid=20443 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:38 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:38 executing program 1: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 341.191593] audit: type=1400 audit(1543002758.391:3203): avc: denied { map } for pid=20444 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:38 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={"65716c000000a95b00", @ifru_map={0x1ff}}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) [ 341.352071] audit: type=1400 audit(1543002758.431:3204): avc: denied { map } for pid=20446 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={"65716c000000a95b00", @ifru_map={0x1ff}}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) [ 341.441541] audit: type=1400 audit(1543002758.501:3205): avc: denied { map } for pid=20448 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 341.544891] audit: type=1400 audit(1543002758.531:3206): avc: denied { map } for pid=20452 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:39 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) [ 341.664404] audit: type=1400 audit(1543002758.551:3207): avc: denied { map } for pid=20457 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:39 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:39 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={"65716c000000a95b00", @ifru_map={0x1ff}}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) [ 341.752259] audit: type=1400 audit(1543002758.551:3208): avc: denied { map } for pid=20458 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 341.833337] audit: type=1400 audit(1543002758.571:3209): avc: denied { map } for pid=20453 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:39 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:39 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:39 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:39 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:39 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:39 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:39 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:39 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:39 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:39 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:40 executing program 4: socket$inet6(0xa, 0x2100000000000001, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 19:52:40 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) 19:52:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 19:52:40 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:40 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:52:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 19:52:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 19:52:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 19:52:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 19:52:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:40 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 19:52:41 executing program 4: socket$inet6(0xa, 0x2100000000000001, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 19:52:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 19:52:41 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000c000000000000a3c728f1c46b7b31afdc1338d544f9ff9a84136e005afb83de448daa7227c43ab822000700000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:41 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 19:52:41 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000c000000000000a3c728f1c46b7b31afdc1338d544f9ff9a84136e005afb83de448daa7227c43ab822000700000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:41 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 19:52:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2000400) 19:52:41 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000c000000000000a3c728f1c46b7b31afdc1338d544f9ff9a84136e005afb83de448daa7227c43ab822000700000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:41 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 19:52:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:41 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369250008000c000000000000a3c728f1c46b7b31afdc1338d544f9ff9a84136e005afb83de448daa7227c43ab822000700000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 19:52:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2000400) 19:52:41 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 19:52:41 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:41 executing program 4: socket$inet6(0xa, 0x2100000000000001, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 19:52:41 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:41 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2000400) 19:52:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2000400) 19:52:41 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:42 executing program 4: socket$inet6(0xa, 0x2100000000000001, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 19:52:42 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:42 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:42 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:42 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:43 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:43 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:43 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:43 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) [ 346.383050] kauditd_printk_skb: 77 callbacks suppressed [ 346.383058] audit: type=1400 audit(1543002763.791:3287): avc: denied { map } for pid=20695 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 346.503561] audit: type=1400 audit(1543002763.871:3288): avc: denied { map } for pid=20698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:44 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:44 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) [ 346.587449] audit: type=1400 audit(1543002763.871:3289): avc: denied { map } for pid=20699 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 346.701861] audit: type=1400 audit(1543002764.071:3290): avc: denied { map } for pid=20707 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:44 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) [ 346.835182] audit: type=1400 audit(1543002764.091:3291): avc: denied { map } for pid=20711 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 346.961145] audit: type=1400 audit(1543002764.231:3292): avc: denied { map } for pid=20715 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) [ 347.523603] audit: type=1400 audit(1543002764.941:3293): avc: denied { map } for pid=20719 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) [ 347.634464] audit: type=1400 audit(1543002765.011:3294): avc: denied { map } for pid=20722 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:45 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:45 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) [ 347.711341] audit: type=1400 audit(1543002765.051:3295): avc: denied { map } for pid=20725 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 347.769413] audit: type=1400 audit(1543002765.181:3296): avc: denied { map } for pid=20732 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:45 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) flock(r0, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000280)=""/177, 0xffffffffffffff49, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x30c, 0x80000000, 0x100000001, 0x3ff, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x90) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) syz_emit_ethernet(0xfeec, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x33, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) 19:52:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 351.799684] kauditd_printk_skb: 26 callbacks suppressed [ 351.799692] audit: type=1400 audit(1543002769.211:3323): avc: denied { map } for pid=20840 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 351.897623] audit: type=1400 audit(1543002769.271:3324): avc: denied { map } for pid=20843 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) [ 352.004228] audit: type=1400 audit(1543002769.421:3325): avc: denied { map } for pid=20848 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:52:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000680)=0x2, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ipddp0\x00', 0xc570}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000001c0)={0x2005}) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x40}, 0xf) fstat(r1, &(0x7f0000000380)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000480)=0x7) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) fallocate(r2, 0x22, 0xfffffffffffffff9, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x3, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfffe, 0x9}, 0x0) getdents(r2, &(0x7f0000000580)=""/204, 0xcc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e21, @multicast1}, {0x7}, 0x44, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'syz_tun\x00'}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0, 0x1008001}, {0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstat(r3, &(0x7f0000000500)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) [ 352.112384] audit: type=1400 audit(1543002769.531:3326): avc: denied { map } for pid=20851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 352.227231] audit: type=1400 audit(1543002769.581:3327): avc: denied { map } for pid=20854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 352.314177] audit: type=1400 audit(1543002769.731:3328): avc: denied { map } for pid=20861 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 352.784206] audit: type=1400 audit(1543002770.201:3329): avc: denied { map } for pid=20864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 352.848464] audit: type=1400 audit(1543002770.241:3330): avc: denied { map } for pid=20867 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 352.962865] audit: type=1400 audit(1543002770.331:3331): avc: denied { map } for pid=20871 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 353.102605] audit: type=1400 audit(1543002770.451:3333): avc: denied { map } for pid=20877 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:53 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @remote, @remote, @ipv4={[], [], @multicast1}}}}}, &(0x7f0000000340)) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 19:52:53 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @remote, @remote, @ipv4={[], [], @multicast1}}}}}, &(0x7f0000000340)) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 19:52:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:54 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @remote, @remote, @ipv4={[], [], @multicast1}}}}}, &(0x7f0000000340)) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 19:52:54 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @remote, @remote, @ipv4={[], [], @multicast1}}}}}, &(0x7f0000000340)) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 19:52:54 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @remote, @remote, @ipv4={[], [], @multicast1}}}}}, &(0x7f0000000340)) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 19:52:54 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @remote, @remote, @ipv4={[], [], @multicast1}}}}}, &(0x7f0000000340)) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 19:52:54 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @remote, @remote, @ipv4={[], [], @multicast1}}}}}, &(0x7f0000000340)) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) [ 356.881736] kauditd_printk_skb: 25 callbacks suppressed [ 356.881745] audit: type=1400 audit(1543002774.301:3358): avc: denied { map } for pid=20974 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 357.021390] audit: type=1400 audit(1543002774.401:3359): avc: denied { map } for pid=20977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0x6c, {0x2, 0x0, @multicast2}, 'ip6_vti0\x00'}) [ 357.194664] audit: type=1400 audit(1543002774.611:3360): avc: denied { map } for pid=20979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 357.304117] audit: type=1400 audit(1543002774.671:3361): avc: denied { map } for pid=20981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:54 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:52:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0x6c, {0x2, 0x0, @multicast2}, 'ip6_vti0\x00'}) [ 357.361669] audit: type=1400 audit(1543002774.711:3362): avc: denied { map } for pid=20982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 357.452020] audit: type=1400 audit(1543002774.771:3363): avc: denied { map } for pid=20985 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 357.550302] audit: type=1400 audit(1543002774.851:3364): avc: denied { map } for pid=20991 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0x6c, {0x2, 0x0, @multicast2}, 'ip6_vti0\x00'}) 19:52:55 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) [ 357.621254] audit: type=1400 audit(1543002774.941:3365): avc: denied { map } for pid=21001 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0x6c, {0x2, 0x0, @multicast2}, 'ip6_vti0\x00'}) [ 357.687645] audit: type=1400 audit(1543002775.091:3366): avc: denied { map } for pid=21004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:55 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) [ 357.782639] audit: type=1400 audit(1543002775.171:3367): avc: denied { map } for pid=21008 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:52:55 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:52:55 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:52:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:52:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00', 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x0, 0x0, 0x0, 0x8, "b4618cdf5b3c5bec59189092d4440ba800c79e6065373cb8ab453e5e2c40c27a6c7d39473f8e39b0a924d4cf6cfc9e87c78bd04cd2e22ffa5a12937c9cca6af1", "e66273871ed1cd292e3585e0e82e7ae78cc98b0acd7e17ec4fdc136b2b420ea5e8fba22462059aa22f25257e948d4fab635ac96005eb2c6769543281e3975137", "3cc08a22c6002ebbf9f80685b45c729ce815abee58afd444e32d7e68598ff920", [0x8, 0xffffffffffffffc1]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000200)=0x9, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0x99, 0x500, 0xf38, 0x0, 0x0, 0x100, 0x3, 0x1000, 0x0, 0x81, 0xa4d, 0xe4b6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x7b2, 0x80c, 0xa3d, 0x8001, 0x0, 0x6da, 0x0, 0x8, 0x0, 0xae, 0x800, 0x9, 0x7, 0x2, 0x3, 0x258c, 0x7, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000004c0), 0x7}, 0xa, 0x8, 0xfffffffffffffff9, 0x0, 0x9, 0x3}, r2, 0x1, r1, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@dstopts={0x0, 0x1, [], [@generic, @enc_lim, @enc_lim]}, 0x10) socketpair$inet(0x2, 0xe, 0x3, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000340)={@multicast2}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x41, 0x0, 0x40, 0x7, 0x81}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) memfd_create(&(0x7f00000005c0)='!(&-em1vboxnet0\x00', 0x1) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)=[0x3240, 0x6]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000eb00)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f000000ec00)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 19:52:55 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:52:57 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:52:57 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:52:57 executing program 5: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:57 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:57 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:57 executing program 1: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:57 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:52:58 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:52:58 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:58 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:58 executing program 5: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:58 executing program 1: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:59 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:52:59 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) [ 362.375119] kauditd_printk_skb: 318 callbacks suppressed [ 362.375128] audit: type=1400 audit(1543002779.791:3686): avc: denied { map } for pid=21480 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.404556] audit: type=1400 audit(1543002779.791:3687): avc: denied { map } for pid=21481 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.429244] audit: type=1400 audit(1543002779.821:3688): avc: denied { map } for pid=21482 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.451757] audit: type=1400 audit(1543002779.821:3689): avc: denied { map } for pid=21479 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.483918] audit: type=1400 audit(1543002779.901:3690): avc: denied { map } for pid=21489 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.508053] audit: type=1400 audit(1543002779.921:3691): avc: denied { map } for pid=21490 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.534229] audit: type=1400 audit(1543002779.951:3692): avc: denied { map } for pid=21493 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.557668] audit: type=1400 audit(1543002779.961:3693): avc: denied { map } for pid=21494 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.581169] audit: type=1400 audit(1543002779.991:3694): avc: denied { map } for pid=21495 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 362.604209] audit: type=1400 audit(1543002780.021:3695): avc: denied { map } for pid=21496 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:00 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:00 executing program 1: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:00 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:00 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:00 executing program 5: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:01 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:01 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:01 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:01 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:01 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:03 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:03 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:03 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:03 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:53:04 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x54}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) [ 367.407898] kauditd_printk_skb: 351 callbacks suppressed [ 367.407907] audit: type=1400 audit(1543002784.821:4047): avc: denied { map } for pid=22006 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:06 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:06 executing program 4: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:53:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:06 executing program 3: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) [ 369.518212] audit: type=1400 audit(1543002786.931:4048): avc: denied { map } for pid=22011 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 369.588886] audit: type=1400 audit(1543002786.971:4049): avc: denied { map } for pid=22019 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 369.658413] audit: type=1400 audit(1543002786.991:4050): avc: denied { map } for pid=22020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 369.683404] audit: type=1400 audit(1543002787.001:4051): avc: denied { map } for pid=22023 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 369.706836] audit: type=1400 audit(1543002787.031:4052): avc: denied { map } for pid=22024 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 369.730762] audit: type=1400 audit(1543002787.051:4053): avc: denied { map } for pid=22026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 369.774296] audit: type=1400 audit(1543002787.191:4054): avc: denied { map } for pid=22031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:07 executing program 4: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:53:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:07 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 369.805483] audit: type=1400 audit(1543002787.191:4055): avc: denied { map } for pid=22032 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:07 executing program 4: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:53:07 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 369.875539] audit: type=1400 audit(1543002787.291:4056): avc: denied { map } for pid=22033 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:07 executing program 4: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:53:07 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:53:07 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync_file_range(r0, 0x7, 0xf8, 0x7) 19:53:07 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xe6) open$dir(&(0x7f0000000080)='./bus\x00', 0x280, 0x0) 19:53:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:07 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync_file_range(r0, 0x7, 0xf8, 0x7) 19:53:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x148) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getpid() setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000001300)=ANY=[], &(0x7f0000001d80)='./file0\x00', &(0x7f00000012c0)='aufs\x00', 0x3000863, 0x0) 19:53:07 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xe6) open$dir(&(0x7f0000000080)='./bus\x00', 0x280, 0x0) 19:53:07 executing program 3: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:07 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xe6) open$dir(&(0x7f0000000080)='./bus\x00', 0x280, 0x0) 19:53:07 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync_file_range(r0, 0x7, 0xf8, 0x7) 19:53:07 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xe6) open$dir(&(0x7f0000000080)='./bus\x00', 0x280, 0x0) 19:53:08 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync_file_range(r0, 0x7, 0xf8, 0x7) 19:53:08 executing program 5: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:08 executing program 0: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:08 executing program 2: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:08 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:08 executing program 3: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:08 executing program 5: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 2: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:09 executing program 0: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 2: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:09 executing program 3: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xe6) open$dir(&(0x7f0000000080)='./bus\x00', 0x280, 0x0) 19:53:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0xfffffffffffffffc}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) 19:53:09 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xe6) open$dir(&(0x7f0000000080)='./bus\x00', 0x280, 0x0) 19:53:09 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="4c0000001000ff20fffefd956fc283b724a600800200000000000000000000002c00160020020280b598bc593ab68211e5ff2fde33a49868c62f2ca654a6613b6eabf35d4c1cbc832b0790ed", 0x4c}], 0x1}, 0x0) 19:53:09 executing program 5: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="4c0000001000ff20fffefd956fc283b724a600800200000000000000000000002c00160020020280b598bc593ab68211e5ff2fde33a49868c62f2ca654a6613b6eabf35d4c1cbc832b0790ed", 0x4c}], 0x1}, 0x0) 19:53:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x40081271, 0x0) [ 372.416834] kauditd_printk_skb: 41 callbacks suppressed [ 372.416843] audit: type=1400 audit(1543002789.831:4098): avc: denied { map } for pid=22203 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:09 executing program 0: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000400), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000540)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7ff, 0x0, 0xfff, 0x60e, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffc0, 0x0, 0x7f, 0x1000, 0x101, 0x7a, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x1, 0x6, 0x90000, 0x0, 0x80}, 0x0, 0x3, r0, 0x0) exit(0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7, 0x2}) r5 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/68, 0x44, 0x2002, &(0x7f0000000380)=@abs={0x1}, 0x6e) sendfile(r4, 0xffffffffffffffff, &(0x7f0000001540)=0x13, 0x3) read(r5, &(0x7f0000000280)=""/151, 0x97) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x0, 0xffffffff, 0x3724}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 19:53:09 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xe6) open$dir(&(0x7f0000000080)='./bus\x00', 0x280, 0x0) 19:53:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x40081271, 0x0) 19:53:09 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="4c0000001000ff20fffefd956fc283b724a600800200000000000000000000002c00160020020280b598bc593ab68211e5ff2fde33a49868c62f2ca654a6613b6eabf35d4c1cbc832b0790ed", 0x4c}], 0x1}, 0x0) [ 372.448162] audit: type=1400 audit(1543002789.841:4099): avc: denied { map } for pid=22206 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 372.478596] audit: type=1400 audit(1543002789.891:4100): avc: denied { map } for pid=22208 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:10 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="4c0000001000ff20fffefd956fc283b724a600800200000000000000000000002c00160020020280b598bc593ab68211e5ff2fde33a49868c62f2ca654a6613b6eabf35d4c1cbc832b0790ed", 0x4c}], 0x1}, 0x0) [ 372.541748] audit: type=1400 audit(1543002789.951:4101): avc: denied { map } for pid=22213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:10 executing program 2: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x40081271, 0x0) [ 372.602491] audit: type=1400 audit(1543002789.961:4102): avc: denied { map } for pid=22218 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x40081271, 0x0) [ 372.631162] audit: type=1400 audit(1543002790.011:4103): avc: denied { map } for pid=22223 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 372.666234] audit: type=1400 audit(1543002790.081:4104): avc: denied { map } for pid=22228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 372.708561] audit: type=1400 audit(1543002790.081:4105): avc: denied { map } for pid=22227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 372.733199] audit: type=1400 audit(1543002790.131:4106): avc: denied { map } for pid=22239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 372.757070] audit: type=1400 audit(1543002790.151:4107): avc: denied { map } for pid=22238 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @remote, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local, @random="b4f27572f0b0", @multicast2}}}}, 0x0) 19:53:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) epoll_create(0x80) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:53:10 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @remote, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local, @random="b4f27572f0b0", @multicast2}}}}, 0x0) 19:53:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) epoll_create(0x80) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:53:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) epoll_create(0x80) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:53:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @remote, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local, @random="b4f27572f0b0", @multicast2}}}}, 0x0) 19:53:10 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) 19:53:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) epoll_create(0x80) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:53:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @remote, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local, @random="b4f27572f0b0", @multicast2}}}}, 0x0) 19:53:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) epoll_create(0x80) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:53:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) 19:53:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) epoll_create(0x80) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:53:13 executing program 2: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:13 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) 19:53:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) epoll_create(0x80) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:53:13 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) 19:53:13 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:13 executing program 2: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:13 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:13 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:13 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:14 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:14 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:14 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:14 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:14 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:15 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) [ 377.637221] kauditd_printk_skb: 39 callbacks suppressed [ 377.637228] audit: type=1400 audit(1543002795.051:4147): avc: denied { map } for pid=22347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:15 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) [ 377.669702] audit: type=1400 audit(1543002795.071:4148): avc: denied { map } for pid=22348 comm="syz-executor1" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=0 [ 377.748386] audit: type=1400 audit(1543002795.161:4149): avc: denied { map } for pid=22351 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 377.770961] audit: type=1400 audit(1543002795.161:4150): avc: denied { map } for pid=22352 comm="syz-executor4" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=0 19:53:15 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) [ 377.919244] audit: type=1400 audit(1543002795.331:4151): avc: denied { map } for pid=22356 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 377.946233] audit: type=1400 audit(1543002795.331:4152): avc: denied { map } for pid=22355 comm="syz-executor3" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=0 [ 378.016551] audit: type=1400 audit(1543002795.431:4153): avc: denied { map } for pid=22359 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 378.290614] audit: type=1400 audit(1543002795.711:4154): avc: denied { map } for pid=22360 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 378.533677] audit: type=1400 audit(1543002795.951:4155): avc: denied { map } for pid=22361 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 378.636000] audit: type=1400 audit(1543002796.051:4156): avc: denied { map } for pid=22362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:16 executing program 2: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 19:53:16 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:16 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:16 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:16 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:16 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:17 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:17 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:17 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:17 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:17 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:18 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:19 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:19 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:19 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:19 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:19 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:19 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:20 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) 19:53:20 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:20 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) 19:53:20 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) [ 382.865140] kauditd_printk_skb: 31 callbacks suppressed [ 382.865167] audit: type=1400 audit(1543002800.281:4188): avc: denied { map } for pid=22433 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) [ 382.971948] audit: type=1400 audit(1543002800.291:4189): avc: denied { map } for pid=22434 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 382.995577] audit: type=1400 audit(1543002800.331:4190): avc: denied { map } for pid=22438 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 383.018268] audit: type=1400 audit(1543002800.341:4191): avc: denied { map } for pid=22441 comm="syz-executor0" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=0 19:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) [ 383.060135] audit: type=1400 audit(1543002800.351:4192): avc: denied { map } for pid=22436 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 383.097521] audit: type=1400 audit(1543002800.361:4193): avc: denied { map } for pid=22435 comm="syz-executor1" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=0 19:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) [ 383.123544] audit: type=1400 audit(1543002800.371:4195): avc: denied { map } for pid=22439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 383.156126] audit: type=1400 audit(1543002800.371:4194): avc: denied { map } for pid=22445 comm="syz-executor2" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=0 [ 383.181260] audit: type=1400 audit(1543002800.391:4197): avc: denied { map } for pid=22446 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 383.203406] audit: type=1400 audit(1543002800.391:4196): avc: denied { map } for pid=22442 comm="syz-executor4" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=0 19:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r1, 0x1, 0x14, &(0x7f0000caaffb), &(0x7f0000000440)=0xfe8f) 19:53:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) 19:53:20 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) 19:53:21 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) 19:53:21 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:21 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:21 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:21 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:21 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) 19:53:21 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:21 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:21 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:21 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:22 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000002c0)={0x100000000, 0x0, 0x3, 0x3f}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/83) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) prlimit64(r4, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r5, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="80a4794f75d1c431aba8c58c83b01031849584cdbb19becf1ea85ce237e27863ed1abda1b4739b93935480226a42af42806dfa47dfa793b6b042fdade067cf0000000000000000", @ANYRESDEC=r2, @ANYRES16=r4]], 0x8) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0xc, 0x8, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfffffffffffffdfa) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x82481, 0x0) ioctl$TIOCCONS(r5, 0x541d) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = creat(&(0x7f0000000340)='./bus\x00', 0x60) fcntl$setstatus(r8, 0x4, 0x44000) execveat(r7, &(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-)(cgroup(cpusetð1\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='\x00', &(0x7f0000000380)='.:\x00', &(0x7f00000003c0)='vboxnet0md5sumtrusted\x00', &(0x7f0000000400)='\x00'], 0x10ff) io_setup(0x40000100000003, &(0x7f0000000200)) 19:53:22 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) 19:53:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) 19:53:22 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:53:22 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 19:53:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}}, 0x0) 19:53:22 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000000)) creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) lremovexattr(&(0x7f00000002c0)='./bus\x00', &(0x7f00000003c0)=@random={'user.', 'md5sum{vboxnet1\x00'}) 19:53:22 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000000)) creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) lremovexattr(&(0x7f00000002c0)='./bus\x00', &(0x7f00000003c0)=@random={'user.', 'md5sum{vboxnet1\x00'}) 19:53:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) 19:53:22 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000000)) creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) lremovexattr(&(0x7f00000002c0)='./bus\x00', &(0x7f00000003c0)=@random={'user.', 'md5sum{vboxnet1\x00'}) 19:53:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:23 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:53:23 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:53:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}}, 0x0) 19:53:23 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000000)) creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) lremovexattr(&(0x7f00000002c0)='./bus\x00', &(0x7f00000003c0)=@random={'user.', 'md5sum{vboxnet1\x00'}) 19:53:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}}, 0x0) 19:53:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}]}, 0x28}}, 0x0) 19:53:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) 19:53:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:53:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) 19:53:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 19:53:26 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 388.708512] kauditd_printk_skb: 53 callbacks suppressed [ 388.708521] audit: type=1400 audit(1543002806.121:4251): avc: denied { map } for pid=22625 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 388.780854] audit: type=1400 audit(1543002806.161:4252): avc: denied { map } for pid=22619 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:26 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 388.812382] audit: type=1400 audit(1543002806.171:4253): avc: denied { map } for pid=22621 comm="syz-executor2" path=2F6D656D66643A23656D33232F202864656C6574656429 dev="tmpfs" ino=72834 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=0 [ 388.927646] audit: type=1400 audit(1543002806.341:4254): avc: denied { map } for pid=22640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) [ 389.447792] audit: type=1400 audit(1543002806.861:4255): avc: denied { map } for pid=22647 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) [ 389.533739] audit: type=1400 audit(1543002806.951:4256): avc: denied { map } for pid=22645 comm="syz-executor2" path=2F6D656D66643A23656D33232F202864656C6574656429 dev="tmpfs" ino=71968 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=0 [ 389.633480] audit: type=1400 audit(1543002807.051:4258): avc: denied { map } for pid=22651 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0\x00', 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000000006031409200180000fe80000000000000000000b391cb03ddb869218fcf4e1b0b0000000000ff0200000000001600000000000000010000907800000000fe800073ad5e1081d02aa2aa2f54f176d5648b2c48a26a"], 0x1) 19:53:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000780)={0x4c, 0x0, &(0x7f0000000600)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x10, &(0x7f0000000580)=[@flat={0x77622a85}], &(0x7f00000005c0)=[0x0, 0x18]}}}], 0x0, 0x0, 0x0}) 19:53:27 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 389.678276] audit: type=1400 audit(1543002807.051:4257): avc: denied { map } for pid=22650 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 389.733930] binder: 22658:22661 transaction failed 29189/-22, size 24-16 line 3012 [ 389.748737] audit: type=1400 audit(1543002807.051:4259): avc: denied { map } for pid=22652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 389.776582] binder: undelivered TRANSACTION_ERROR: 29189 [ 389.858753] audit: type=1400 audit(1543002807.131:4260): avc: denied { map } for pid=22655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:53:29 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:53:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0\x00', 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000000006031409200180000fe80000000000000000000b391cb03ddb869218fcf4e1b0b0000000000ff0200000000001600000000000000010000907800000000fe800073ad5e1081d02aa2aa2f54f176d5648b2c48a26a"], 0x1) 19:53:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) 19:53:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) 19:53:29 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="0000000000000000030000000000000000000000004e5a973ae3080000000000000000000000000000000000000000000000000000000000000600000081000000010000000000006a2ef5a51ce96f85009b00000000000000080000000000000000000000000000000000000000000000000000000000000000e99908bf00000006000000000000000600000000000000000000000000000004000000000000000000000000000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c507000000000000000000000000000000000000000000000000000000000000d3fe1dbb988b965a95badbd797520934ea3c4b7831508a3c3f7ea6bed8c23171caf4dc574178ae02d1c0100fb8aab191da2a1f603b63107244746aa80d405a45ba0d93664a6a950788e7457e1316b543a8cc95aef32341b1e49059c8cad5187db5a35baad1690691917688c70f33f5d9a54c50b5c961e84d2c0c00095dfd68bfd5b1f7bb0dd9a91817df90f7b46530ae5f02947109e2f90b87af35c91750284b85c821f322170f66f6924973e07e4b6c2800000000002000000000000000000000000000003650a1eecb072d1390a3dba51d45a6ab0e142aa0d495a0b53dfb5c6f3910cb401470c1f854af3c11a82ea1c822e465c049a37a16d9c0a53bc5faf232cafc76d0fb8002860ebbf77f3d271e0bb4b1f77e5d45dcc5beeeeaa83f7c310ec4036b99ada11d0b6c2389ef8da8c78424c843afabe514d9"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:29 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:53:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0\x00', 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000000006031409200180000fe80000000000000000000b391cb03ddb869218fcf4e1b0b0000000000ff0200000000001600000000000000010000907800000000fe800073ad5e1081d02aa2aa2f54f176d5648b2c48a26a"], 0x1) 19:53:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0\x00', 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000000006031409200180000fe80000000000000000000b391cb03ddb869218fcf4e1b0b0000000000ff0200000000001600000000000000010000907800000000fe800073ad5e1081d02aa2aa2f54f176d5648b2c48a26a"], 0x1) 19:53:29 executing program 4: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="0000000000000000030000000000000000000000004e5a973ae3080000000000000000000000000000000000000000000000000000000000000600000081000000010000000000006a2ef5a51ce96f85009b00000000000000080000000000000000000000000000000000000000000000000000000000000000e99908bf00000006000000000000000600000000000000000000000000000004000000000000000000000000000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c507000000000000000000000000000000000000000000000000000000000000d3fe1dbb988b965a95badbd797520934ea3c4b7831508a3c3f7ea6bed8c23171caf4dc574178ae02d1c0100fb8aab191da2a1f603b63107244746aa80d405a45ba0d93664a6a950788e7457e1316b543a8cc95aef32341b1e49059c8cad5187db5a35baad1690691917688c70f33f5d9a54c50b5c961e84d2c0c00095dfd68bfd5b1f7bb0dd9a91817df90f7b46530ae5f02947109e2f90b87af35c91750284b85c821f322170f66f6924973e07e4b6c2800000000002000000000000000000000000000003650a1eecb072d1390a3dba51d45a6ab0e142aa0d495a0b53dfb5c6f3910cb401470c1f854af3c11a82ea1c822e465c049a37a16d9c0a53bc5faf232cafc76d0fb8002860ebbf77f3d271e0bb4b1f77e5d45dcc5beeeeaa83f7c310ec4036b99ada11d0b6c2389ef8da8c78424c843afabe514d9"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:29 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:53:29 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:53:32 executing program 2: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:32 executing program 0: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:32 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:32 executing program 5: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000006, 0x11, r1, 0x0) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) 19:53:32 executing program 4: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 394.755977] kauditd_printk_skb: 27 callbacks suppressed [ 394.755985] audit: type=1400 audit(1543002812.171:4288): avc: denied { map } for pid=22736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 394.852094] audit: type=1400 audit(1543002812.241:4289): avc: denied { map } for pid=22749 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 395.001558] audit: type=1400 audit(1543002812.241:4290): avc: denied { map } for pid=22748 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 395.128526] audit: type=1400 audit(1543002812.251:4291): avc: denied { map } for pid=22738 comm="syz-executor3" path=2F6D656D66643A23656D33232F202864656C6574656429 dev="tmpfs" ino=72976 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=0 [ 395.305466] audit: type=1400 audit(1543002812.261:4292): avc: denied { map } for pid=22753 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 395.401851] audit: type=1400 audit(1543002812.301:4293): avc: denied { map } for pid=22756 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 395.497479] audit: type=1400 audit(1543002812.321:4294): avc: denied { map } for pid=22759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:33 executing program 2: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 395.675685] audit: type=1400 audit(1543002812.331:4295): avc: denied { map } for pid=22760 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:33 executing program 0: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:33 executing program 5: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:33 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="0000000000000000030000000000000000000000004e5a973ae3080000000000000000000000000000000000000000000000000000000000000600000081000000010000000000006a2ef5a51ce96f85009b00000000000000080000000000000000000000000000000000000000000000000000000000000000e99908bf00000006000000000000000600000000000000000000000000000004000000000000000000000000000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c507000000000000000000000000000000000000000000000000000000000000d3fe1dbb988b965a95badbd797520934ea3c4b7831508a3c3f7ea6bed8c23171caf4dc574178ae02d1c0100fb8aab191da2a1f603b63107244746aa80d405a45ba0d93664a6a950788e7457e1316b543a8cc95aef32341b1e49059c8cad5187db5a35baad1690691917688c70f33f5d9a54c50b5c961e84d2c0c00095dfd68bfd5b1f7bb0dd9a91817df90f7b46530ae5f02947109e2f90b87af35c91750284b85c821f322170f66f6924973e07e4b6c2800000000002000000000000000000000000000003650a1eecb072d1390a3dba51d45a6ab0e142aa0d495a0b53dfb5c6f3910cb401470c1f854af3c11a82ea1c822e465c049a37a16d9c0a53bc5faf232cafc76d0fb8002860ebbf77f3d271e0bb4b1f77e5d45dcc5beeeeaa83f7c310ec4036b99ada11d0b6c2389ef8da8c78424c843afabe514d9"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 395.816237] audit: type=1400 audit(1543002812.351:4296): avc: denied { map } for pid=22762 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:33 executing program 4: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 395.955880] audit: type=1400 audit(1543002812.381:4297): avc: denied { map } for pid=22763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:33 executing program 3: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:34 executing program 2: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:34 executing program 5: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="0000000000000000030000000000000000000000004e5a973ae3080000000000000000000000000000000000000000000000000000000000000600000081000000010000000000006a2ef5a51ce96f85009b00000000000000080000000000000000000000000000000000000000000000000000000000000000e99908bf00000006000000000000000600000000000000000000000000000004000000000000000000000000000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c507000000000000000000000000000000000000000000000000000000000000d3fe1dbb988b965a95badbd797520934ea3c4b7831508a3c3f7ea6bed8c23171caf4dc574178ae02d1c0100fb8aab191da2a1f603b63107244746aa80d405a45ba0d93664a6a950788e7457e1316b543a8cc95aef32341b1e49059c8cad5187db5a35baad1690691917688c70f33f5d9a54c50b5c961e84d2c0c00095dfd68bfd5b1f7bb0dd9a91817df90f7b46530ae5f02947109e2f90b87af35c91750284b85c821f322170f66f6924973e07e4b6c2800000000002000000000000000000000000000003650a1eecb072d1390a3dba51d45a6ab0e142aa0d495a0b53dfb5c6f3910cb401470c1f854af3c11a82ea1c822e465c049a37a16d9c0a53bc5faf232cafc76d0fb8002860ebbf77f3d271e0bb4b1f77e5d45dcc5beeeeaa83f7c310ec4036b99ada11d0b6c2389ef8da8c78424c843afabe514d9"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)) 19:53:34 executing program 4: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)) 19:53:34 executing program 4: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)) 19:53:35 executing program 0: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)) 19:53:35 executing program 4: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:35 executing program 3: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:35 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:35 executing program 1: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff00000000720af9ff2300000079a0f8ff000000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x48) 19:53:35 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 19:53:35 executing program 4: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:35 executing program 1: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 19:53:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'lo\x00', 0x9000}) 19:53:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 19:53:36 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:36 executing program 1: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x80800) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffff8e, 0x2000, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'nr0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3a778602, 0x7, 0x400, 0x77, 0x0, 0xff, 0x800, 0x6, 0x7bb9, 0x2f, 0x9, 0x6, 0x3ff, 0x5778afb3, 0x3, 0xfbca, 0x251b, 0x1, 0x784, 0x8000, 0x7f, 0x200, 0x1, 0x7, 0x4000000000000, 0x0, 0x5, 0x80000000, 0xfffffffffffffffb, 0x80000001, 0x8, 0x3ff, 0x6, 0x9, 0x7fff, 0x6, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x1c, 0x6b, 0x0, 0x800, 0x1}, 0x0, 0x6, r1, 0x1) mkdirat(r1, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000016ff8)='./file0\x00', 0x0) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r2, @local, @multicast2}, 0xc) r3 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r3, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:53:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 19:53:36 executing program 3: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket(0x80000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)=""/21, &(0x7f0000000100)=0x15) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="eb1dfb5e283b4b8430186d5adf3f5e09a9db89922100dbcbc2129bb81d3c", 0x1e, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x6}) syz_read_part_table(0x0, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x122000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) setsockopt(r1, 0x7, 0x9, &(0x7f0000000740)="831748fa5a0ff70693b56078dde4a570d4e2e4209d5d30060b7a7f8fcefc55d887c334ddc361f54ca3c5cf2eb01872613cf44e9f2eeb989ddeddea1dec515e0ec460fc560a1526a7a40d8d1d3106720c78", 0x51) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xffffffffffffffaa) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x200, 0x9, 0x0, 0x7}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000008c0), &(0x7f00000002c0)=0x68) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf}, 0xf) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x7fff, 0x0, 0x0, 0x4}, &(0x7f00000003c0)=0x20) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pwrite64(0xffffffffffffffff, &(0x7f0000000800)="2d149c3b103e757424c5d78c85e8380731a9c6169e6b992cfc26359cd6a9b245d8044f91b1e5b1d6929655f365a78b2ef76eecd7a8de9030fc1bc3947ddc5f5a1afeaedb0f2f5884d63bc9e5597d1dbc", 0x50, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) rt_sigpending(&(0x7f0000000440), 0x8) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 19:53:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'lo\x00', 0x9000}) 19:53:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 19:53:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 19:53:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'lo\x00', 0x9000}) 19:53:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:36 executing program 2: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'lo\x00', 0x9000}) 19:53:36 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff074800000000000000000000000000003f2300000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 19:53:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 19:53:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 19:53:36 executing program 5: dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000140)=""/40, 0x28, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'bond_slave_1\x00', @link_local}) [ 399.342561] print_req_error: 432 callbacks suppressed [ 399.342571] print_req_error: I/O error, dev loop7, sector 96 [ 399.353750] buffer_io_error: 432 callbacks suppressed [ 399.353756] Buffer I/O error on dev loop7, logical block 12, lost async page write 19:53:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 19:53:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 19:53:37 executing program 5: dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000140)=""/40, 0x28, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'bond_slave_1\x00', @link_local}) 19:53:37 executing program 2: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:37 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 400.061930] kauditd_printk_skb: 68 callbacks suppressed [ 400.061938] audit: type=1400 audit(1543002817.471:4366): avc: denied { map } for pid=22986 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 400.141399] audit: type=1400 audit(1543002817.551:4367): avc: denied { map } for pid=22998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 400.208612] audit: type=1400 audit(1543002817.561:4368): avc: denied { map } for pid=22997 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 400.213637] print_req_error: I/O error, dev loop7, sector 0 19:53:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 19:53:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 19:53:37 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:37 executing program 5: dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000140)=""/40, 0x28, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'bond_slave_1\x00', @link_local}) 19:53:37 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:37 executing program 2: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 400.269571] audit: type=1400 audit(1543002817.591:4369): avc: denied { map } for pid=23000 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 400.314648] audit: type=1400 audit(1543002817.611:4370): avc: denied { map } for pid=23003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 19:53:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 19:53:37 executing program 2: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 400.366991] audit: type=1400 audit(1543002817.631:4371): avc: denied { map } for pid=23002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:37 executing program 5: dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000140)=""/40, 0x28, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'bond_slave_1\x00', @link_local}) 19:53:37 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:37 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 400.487145] print_req_error: I/O error, dev loop7, sector 0 [ 400.512140] audit: type=1400 audit(1543002817.661:4372): avc: denied { map } for pid=23005 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 19:53:38 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:38 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:38 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 400.611861] audit: type=1400 audit(1543002817.671:4373): avc: denied { map } for pid=23004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 400.711893] audit: type=1400 audit(1543002817.681:4374): avc: denied { map } for pid=23006 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 400.764322] print_req_error: I/O error, dev loop7, sector 128 [ 400.770286] Buffer I/O error on dev loop7, logical block 16, lost async page write 19:53:38 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 400.810229] audit: type=1400 audit(1543002817.781:4375): avc: denied { map } for pid=23015 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 401.018999] print_req_error: I/O error, dev loop7, sector 128 [ 401.024997] Buffer I/O error on dev loop7, logical block 16, lost async page write 19:53:38 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:38 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 401.629098] print_req_error: I/O error, dev loop7, sector 128 [ 401.635223] Buffer I/O error on dev loop7, logical block 16, lost async page write 19:53:39 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:39 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:39 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:39 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:39 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 401.928656] print_req_error: I/O error, dev loop7, sector 192 [ 401.934761] Buffer I/O error on dev loop7, logical block 24, lost async page write 19:53:39 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:39 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 402.194494] print_req_error: I/O error, dev loop7, sector 128 [ 402.200475] Buffer I/O error on dev loop7, logical block 16, lost async page write [ 402.427388] print_req_error: I/O error, dev loop7, sector 128 [ 402.433425] Buffer I/O error on dev loop7, logical block 16, lost async page write 19:53:39 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:40 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 402.773453] print_req_error: I/O error, dev loop7, sector 0 [ 402.779292] Buffer I/O error on dev loop7, logical block 0, lost async page write 19:53:40 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:40 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:40 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:40 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 403.062928] Buffer I/O error on dev loop7, logical block 16, lost async page write 19:53:40 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 403.323133] Buffer I/O error on dev loop7, logical block 16, lost async page write 19:53:40 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:53:40 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:41 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:41 executing program 1: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:41 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:41 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:41 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:41 executing program 1: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 404.377955] ================================================================== [ 404.385397] BUG: KASAN: slab-out-of-bounds in perf_output_read+0xe4d/0xfb0 [ 404.392402] Read of size 8 at addr ffff8801c4007ef8 by task syz-executor0/23175 [ 404.399833] [ 404.401462] CPU: 1 PID: 23175 Comm: syz-executor0 Not tainted 4.14.83+ #9 [ 404.408377] Call Trace: [ 404.410988] dump_stack+0xb9/0x11b [ 404.414539] print_address_description+0x60/0x22b [ 404.419392] kasan_report.cold.6+0x11b/0x2dd [ 404.423802] ? perf_output_read+0xe4d/0xfb0 [ 404.428137] perf_output_read+0xe4d/0xfb0 [ 404.432304] ? retint_kernel+0x2d/0x2d [ 404.436199] ? perf_event_exit_cpu_context+0x170/0x170 [ 404.441497] ? perf_output_copy+0x150/0x1e0 [ 404.445838] perf_output_sample+0x10dd/0x1780 [ 404.450350] ? HARDIRQ_verbose+0x10/0x10 [ 404.454413] ? flush_tlb_func_common.constprop.3+0x8f0/0x8f0 [ 404.460217] ? __perf_event_header__init_id.isra.35+0x274/0x420 [ 404.466286] ? perf_event__output_id_sample+0x70/0x70 [ 404.471488] ? perf_output_sample+0x1780/0x1780 [ 404.476162] ? lock_acquire+0x10f/0x380 [ 404.480143] ? perf_prepare_sample+0x13c0/0x13c0 [ 404.484914] perf_event_output_forward+0x121/0x230 [ 404.489857] ? perf_prepare_sample+0x13c0/0x13c0 [ 404.494633] ? trace_hardirqs_on_caller+0x381/0x520 [ 404.499653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 404.504436] __perf_event_overflow+0x116/0x320 [ 404.509028] perf_swevent_overflow+0x166/0x1f0 [ 404.513636] ? check_preemption_disabled+0x34/0x1e0 [ 404.518659] perf_swevent_event+0x19c/0x270 [ 404.522985] ___perf_sw_event+0x296/0x480 [ 404.527145] ? __lock_acquire+0x619/0x4320 [ 404.531379] ? perf_pending_event+0xe0/0xe0 [ 404.535680] ? do_wp_page+0x254/0x1880 [ 404.539570] ? check_preemption_disabled+0x34/0x1e0 [ 404.544568] ? perf_trace_lock+0x11a/0x4c0 [ 404.548785] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 404.553710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 404.558445] ? vm_insert_page+0x6d0/0x6d0 [ 404.562574] ? retint_kernel+0x2d/0x2d [ 404.566451] ? __do_page_fault+0x485/0xb60 [ 404.570667] ? check_preemption_disabled+0x34/0x1e0 [ 404.575694] ? __perf_sw_event+0x3f/0x70 [ 404.579758] __perf_sw_event+0x3f/0x70 [ 404.583644] __do_page_fault+0x77f/0xb60 [ 404.587698] ? retint_kernel+0x2d/0x2d [ 404.591573] ? bad_area_access_error+0x330/0x330 [ 404.596335] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 404.601163] page_fault+0x22/0x50 [ 404.604595] RIP: 0010:copy_user_enhanced_fast_string+0x7/0x10 [ 404.610468] RSP: 0018:ffff8801907dfb48 EFLAGS: 00010206 [ 404.615821] RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000500 [ 404.623070] RDX: 0000000000001000 RSI: ffff8801cd6a2b00 RDI: 00000000202e8000 [ 404.630324] RBP: 00000000202e7500 R08: 0000000000000000 R09: 0000000000000040 [ 404.637580] R10: ffffed0039ad45ff R11: ffff8801cd6a2fff R12: ffff8801cd6a2000 [ 404.644825] R13: 00007ffffffff000 R14: 00000000202e8500 R15: 0000000000001000 [ 404.652114] copyout+0x99/0xc0 [ 404.655308] copy_page_to_iter+0x31d/0xd40 [ 404.659545] pipe_to_user+0xa6/0x160 [ 404.663243] ? anon_pipe_buf_release+0x17f/0x210 [ 404.667991] __splice_from_pipe+0x324/0x740 [ 404.672309] ? iter_to_pipe+0x410/0x410 [ 404.676286] vmsplice_to_user+0x1bd/0x1e0 [ 404.680414] ? __splice_from_pipe+0x740/0x740 [ 404.684901] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 404.689836] ? retint_kernel+0x2d/0x2d [ 404.693748] ? lock_downgrade+0x560/0x560 [ 404.697878] ? lock_acquire+0x10f/0x380 [ 404.701842] ? check_preemption_disabled+0x34/0x1e0 [ 404.706845] ? __fget+0x22b/0x3a0 [ 404.710305] SyS_vmsplice+0x12f/0x150 [ 404.714112] ? default_file_splice_write+0x80/0x80 [ 404.719027] do_syscall_64+0x19b/0x4b0 [ 404.722915] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 404.728097] RIP: 0033:0x457569 [ 404.731280] RSP: 002b:00007f3771401c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 404.738980] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 404.746232] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 404.753495] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 404.760744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37714026d4 [ 404.767995] R13: 00000000004c5717 R14: 00000000004d9778 R15: 00000000ffffffff [ 404.775271] [ 404.776876] Allocated by task 23175: [ 404.780578] kasan_kmalloc.part.1+0x4f/0xd0 [ 404.784882] kmem_cache_alloc_trace+0x138/0x300 [ 404.789535] alloc_perf_context+0x47/0xe0 [ 404.793669] find_get_context.isra.49+0x119/0x550 [ 404.798488] SyS_perf_event_open+0x9df/0x27d0 [ 404.802968] do_syscall_64+0x19b/0x4b0 [ 404.806831] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 404.811996] [ 404.813615] Freed by task 21883: [ 404.816982] kasan_slab_free+0xac/0x190 [ 404.820947] kfree+0xf5/0x310 [ 404.824031] skb_free_head+0x83/0xa0 [ 404.827738] skb_release_data+0x495/0x610 [ 404.831862] skb_release_all+0x46/0x60 [ 404.835736] consume_skb+0xc1/0x330 [ 404.839365] icmp_rcv+0x814/0x1290 [ 404.842895] ip_local_deliver_finish+0x3f1/0xaa0 [ 404.847629] ip_local_deliver+0x374/0x450 [ 404.851762] ip_rcv_finish+0x5cc/0x1490 [ 404.855721] ip_rcv+0xa19/0x1028 [ 404.859068] __netif_receive_skb_core+0x149d/0x2d10 [ 404.864061] __netif_receive_skb+0x58/0x1f0 [ 404.868363] process_backlog+0x229/0x6e0 [ 404.872404] net_rx_action+0x371/0xce0 [ 404.876268] __do_softirq+0x20d/0x9bd [ 404.880042] [ 404.881658] The buggy address belongs to the object at ffff8801c4007b80 [ 404.881658] which belongs to the cache kmalloc-512 of size 512 [ 404.894310] The buggy address is located 376 bytes to the right of [ 404.894310] 512-byte region [ffff8801c4007b80, ffff8801c4007d80) [ 404.906679] The buggy address belongs to the page: [ 404.911584] page:ffffea0007100180 count:1 mapcount:0 mapping: (null) index:0xffff8801c4006000 compound_mapcount: 0 [ 404.922833] flags: 0x4000000000008100(slab|head) [ 404.927573] raw: 4000000000008100 0000000000000000 ffff8801c4006000 00000001800c000b [ 404.935467] raw: ffffea0007133a80 0000000800000008 ffff8801d6402c00 0000000000000000 [ 404.943331] page dumped because: kasan: bad access detected [ 404.949016] [ 404.950623] Memory state around the buggy address: [ 404.955530] ffff8801c4007d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 404.962867] ffff8801c4007e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 404.970220] >ffff8801c4007e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 19:53:42 executing program 1: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:42 executing program 4: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) pipe2(&(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x100082) r1 = memfd_create(&(0x7f0000000380)='ramfs\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) pipe(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000200), 0xc) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:53:42 executing program 2: dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000140)=""/40, 0x28, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'bond_slave_1\x00', @link_local}) 19:53:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) [ 404.977553] ^ [ 404.984800] ffff8801c4007f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 404.992141] ffff8801c4007f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 404.999472] ================================================================== [ 405.006821] Disabling lock debugging due to kernel taint [ 405.014447] Kernel panic - not syncing: panic_on_warn set ... [ 405.014447] [ 405.021817] CPU: 1 PID: 23175 Comm: syz-executor0 Tainted: G B 4.14.83+ #9 [ 405.029970] Call Trace: [ 405.032566] dump_stack+0xb9/0x11b [ 405.036136] panic+0x1bf/0x3a4 [ 405.039335] ? add_taint.cold.4+0x16/0x16 [ 405.043502] kasan_end_report+0x43/0x49 [ 405.047471] kasan_report.cold.6+0x77/0x2dd [ 405.051807] ? perf_output_read+0xe4d/0xfb0 [ 405.056165] perf_output_read+0xe4d/0xfb0 [ 405.060323] ? retint_kernel+0x2d/0x2d [ 405.064213] ? perf_event_exit_cpu_context+0x170/0x170 [ 405.069498] ? perf_output_copy+0x150/0x1e0 [ 405.073825] perf_output_sample+0x10dd/0x1780 [ 405.078318] ? HARDIRQ_verbose+0x10/0x10 [ 405.082413] ? flush_tlb_func_common.constprop.3+0x8f0/0x8f0 [ 405.083811] kauditd_printk_skb: 69 callbacks suppressed [ 405.083819] audit: type=1400 audit(1543002822.501:4445): avc: denied { map } for pid=23220 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 405.115589] ? __perf_event_header__init_id.isra.35+0x274/0x420 [ 405.121706] ? perf_event__output_id_sample+0x70/0x70 [ 405.126896] ? perf_output_sample+0x1780/0x1780 [ 405.131585] ? lock_acquire+0x10f/0x380 [ 405.135591] ? perf_prepare_sample+0x13c0/0x13c0 [ 405.140374] perf_event_output_forward+0x121/0x230 [ 405.141802] audit: type=1400 audit(1543002822.561:4446): avc: denied { map } for pid=23224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 405.146699] audit: type=1400 audit(1543002822.561:4447): avc: denied { map } for pid=23226 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 405.154662] audit: type=1400 audit(1543002822.571:4448): avc: denied { map } for pid=23227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 405.163539] audit: type=1400 audit(1543002822.581:4449): avc: denied { map } for pid=23228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 405.233311] ? perf_prepare_sample+0x13c0/0x13c0 [ 405.238059] ? trace_hardirqs_on_caller+0x381/0x520 [ 405.243052] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.247850] __perf_event_overflow+0x116/0x320 [ 405.252409] perf_swevent_overflow+0x166/0x1f0 [ 405.256984] ? check_preemption_disabled+0x34/0x1e0 [ 405.262003] perf_swevent_event+0x19c/0x270 [ 405.266314] ___perf_sw_event+0x296/0x480 [ 405.270437] ? __lock_acquire+0x619/0x4320 [ 405.274650] ? perf_pending_event+0xe0/0xe0 [ 405.278948] ? do_wp_page+0x254/0x1880 [ 405.282829] ? check_preemption_disabled+0x34/0x1e0 [ 405.287838] ? perf_trace_lock+0x11a/0x4c0 [ 405.292054] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 405.296958] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.301694] ? vm_insert_page+0x6d0/0x6d0 [ 405.305822] ? retint_kernel+0x2d/0x2d [ 405.309695] ? __do_page_fault+0x485/0xb60 [ 405.313919] ? check_preemption_disabled+0x34/0x1e0 [ 405.318941] ? __perf_sw_event+0x3f/0x70 [ 405.322977] __perf_sw_event+0x3f/0x70 [ 405.326847] __do_page_fault+0x77f/0xb60 [ 405.330906] ? retint_kernel+0x2d/0x2d [ 405.334773] ? bad_area_access_error+0x330/0x330 [ 405.339505] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.344332] page_fault+0x22/0x50 [ 405.347765] RIP: 0010:copy_user_enhanced_fast_string+0x7/0x10 [ 405.353647] RSP: 0018:ffff8801907dfb48 EFLAGS: 00010206 [ 405.359017] RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000500 [ 405.366263] RDX: 0000000000001000 RSI: ffff8801cd6a2b00 RDI: 00000000202e8000 [ 405.373511] RBP: 00000000202e7500 R08: 0000000000000000 R09: 0000000000000040 [ 405.380760] R10: ffffed0039ad45ff R11: ffff8801cd6a2fff R12: ffff8801cd6a2000 [ 405.388008] R13: 00007ffffffff000 R14: 00000000202e8500 R15: 0000000000001000 [ 405.395284] copyout+0x99/0xc0 [ 405.398487] copy_page_to_iter+0x31d/0xd40 [ 405.402735] pipe_to_user+0xa6/0x160 [ 405.406432] ? anon_pipe_buf_release+0x17f/0x210 [ 405.411164] __splice_from_pipe+0x324/0x740 [ 405.415463] ? iter_to_pipe+0x410/0x410 [ 405.419415] vmsplice_to_user+0x1bd/0x1e0 [ 405.423559] ? __splice_from_pipe+0x740/0x740 [ 405.428027] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 405.432938] ? retint_kernel+0x2d/0x2d [ 405.436808] ? lock_downgrade+0x560/0x560 [ 405.440930] ? lock_acquire+0x10f/0x380 [ 405.444882] ? check_preemption_disabled+0x34/0x1e0 [ 405.449880] ? __fget+0x22b/0x3a0 [ 405.453317] SyS_vmsplice+0x12f/0x150 [ 405.457093] ? default_file_splice_write+0x80/0x80 [ 405.462012] do_syscall_64+0x19b/0x4b0 [ 405.465885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 405.471050] RIP: 0033:0x457569 [ 405.474215] RSP: 002b:00007f3771401c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 405.481902] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 405.489153] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 405.496401] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 405.503645] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37714026d4 [ 405.510895] R13: 00000000004c5717 R14: 00000000004d9778 R15: 00000000ffffffff [ 405.518511] Kernel Offset: 0xf400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 405.529325] Rebooting in 86400 seconds..